[HTML][HTML] Survey: automatic generation of attack trees and attack graphs

AM Konsta, AL Lafuente, B Spiga, N Dragoni - Computers & Security, 2024 - Elsevier
Graphical security models constitute a well-known, user-friendly way to represent the
security of a system. These classes of models are used by security experts to identify …

Special Issue on “Advances in condition monitoring, optimization and control for complex industrial processes”

Z Gao, MZQ Chen, D Zhang - Processes, 2021 - mdpi.com
Complex industrial automation systems and processes, such as chemical processes,
manufacturing systems, wireless network systems, power and energy systems, smart grids …

[HTML][HTML] SpecRep: Adversary Emulation Based on Attack Objective Specification in Heterogeneous Infrastructures

RM Portase, A Colesa, G Sebestyen - Sensors, 2024 - mdpi.com
Cybercriminals have become an imperative threat because they target the most valuable
resource on earth, data. Organizations prepare against cyber attacks by creating Cyber …

Automated adversary emulation for cyber-physical systems via reinforcement learning

A Bhattacharya, T Ramachandran… - … on Intelligence and …, 2020 - ieeexplore.ieee.org
Adversary emulation is an offensive exercise that provides a comprehensive assessment of
a system's resilience against cyber attacks. However, adversary emulation is typically a …

Active and Passive Defense Strategies of Cyber-Physical Power System against Cyber Attacks Considering Node Vulnerability

Z Qu, H Shi, Y Wang, G Yin, A Abu-Siada - Processes, 2022 - mdpi.com
Vulnerable parts in the cyber-physical power system can be maliciously attacked to trigger
cascading failures. This paper proposes a defense framework with active and passive …

Impact-driven sampling strategies for hybrid attack graphs

O Subasi, S Purohit, A Bhattacharya… - … on Technologies for …, 2022 - ieeexplore.ieee.org
Cyber-Physical Systems (CPSs) have a large input space, with discrete and continuous
elements across multiple layers. Hybrid Attack Graphs (HAGs) provide a flexible and efficient …

ICCPS: Impact discovery using causal inference for cyber attacks in CPSs

RR Maiti, S Adepu, E Lupu - arxiv preprint arxiv:2307.14161, 2023 - arxiv.org
We propose a new method to quantify the impact of cyber attacks in Cyber Physical Systems
(CPSs). In particular, our method allows to identify the Design Parameter (DPs) affected due …

A Hybrid Attack Graph Analysis Method based on Model Checking

Y Ge, X Shen, B Xu, G He - … on Advanced Cloud and Big Data …, 2022 - ieeexplore.ieee.org
Attack graph is an essential tool for the security assessment of industrial Internet systems.
Unfortunately, the traditional attack graph mainly focuses on discrete information and cannot …

Community-based link-addition strategies for mitigating cascading failures in modern power systems

P Hu, L Lee - Processes, 2020 - mdpi.com
The propagation of cascading failures of modern power systems is mainly constrained by
the network topology and system parameter. In order to alleviate the cascading failure …

[책][B] Adversarial Modeling in Game-Theoretic Frameworks for Securing Cyber-Physical Systems

S Banik - 2023 - search.proquest.com
In an era where intricate cyber and physical systems are integrated into daily life, the
imperative for controlling and optimizing them emerges as a critical avenue. This avenue …