A comprehensive survey on cyber-physical smart grid testbed architectures: Requirements and challenges

AA Smadi, BT Ajao, BK Johnson, H Lei… - Electronics, 2021 - mdpi.com
The integration of improved control techniques with advanced information technologies
enables the rapid development of smart grids. The necessity of having an efficient, reliable …

[PDF][PDF] Simulation for cybersecurity: state of the art and future directions

H Kavak, JJ Padilla, D Vernon-Bido… - Journal of …, 2021 - academic.oup.com
In this article, we provide an introduction to simulation for cybersecurity and focus on three
themes:(1) an overview of the cybersecurity domain;(2) a summary of notable simulation …

[HTML][HTML] A new concept of digital twin supporting optimization and resilience of factories of the future

A Bécue, E Maia, L Feeken, P Borchers, I Praça - Applied Sciences, 2020 - mdpi.com
Featured Application This work was elaborated in the frame of a collaborative innovation
project named CyberFactory# 1 which aims at enhancing optimization and resilience of …

Design considerations for building credible security testbeds: Perspectives from industrial control system use cases

UPD Ani, JM Watson, B Green, B Craggs… - Journal of Cyber …, 2021 - Taylor & Francis
This paper presents a map** framework for design factors and an implementation process
for building credible Industrial Control Systems (ICS) security testbeds. The security and …

[HTML][HTML] Two decades of cyberattack simulations: A systematic literature review

V Engström, R Lagerström - Computers & Security, 2022 - Elsevier
Cyberattack simulations appear across multiple computer security domains and are
interpreted in many different but equally viable ways. However, this makes the topic appear …

[HTML][HTML] Cyber attack and defense emulation agents

JD Yoo, E Park, G Lee, MK Ahn, D Kim, S Seo… - Applied Sciences, 2020 - mdpi.com
As the scale of the system and network grows, IT infrastructure becomes more complex and
hard to be managed. Many organizations have a serious problem to manage their system …

Sok: A survey of open-source threat emulators

P Zilberman, R Puzis, S Bruskin, S Shwarz… - arxiv preprint arxiv …, 2020 - arxiv.org
Threat emulators are tools or sets of scripts that emulate cyber attacks or malicious behavior.
They can be used to create and launch single procedure attacks and multi-step attacks; the …

Analysis of automated adversary emulation techniques

A Applebaum, D Miller, B Strom, H Foster… - Proceedings of the …, 2017 - dl.acm.org
Adversary emulation offers a concrete way to measure a network's resilience against an
advanced attacker. Unfortunately, adversary emulation is typically a manual process …

[PDF][PDF] System-of-systems threat model

DJ Bodeau, CD McCollum - … Institute (HSSEDI) MITRE: Bedford, MA, USA, 2018 - mitre.org
Abstract The Homeland Security Systems Engineering and Development Institute (HSSEDI)
assists the Department of Homeland Security (DHS) Science and Technology Directorate …

[Књига][B] An introduction to cyber modeling and simulation

JM Couretas - 2018 - books.google.com
Introduces readers to the field of cyber modeling and simulation and examines current
developments in the US and internationally This book provides an overview of cyber …