[HTML][HTML] Survey: automatic generation of attack trees and attack graphs
Graphical security models constitute a well-known, user-friendly way to represent the
security of a system. These classes of models are used by security experts to identify …
security of a system. These classes of models are used by security experts to identify …
Special Issue on “Advances in condition monitoring, optimization and control for complex industrial processes”
Z Gao, MZQ Chen, D Zhang - Processes, 2021 - mdpi.com
Complex industrial automation systems and processes, such as chemical processes,
manufacturing systems, wireless network systems, power and energy systems, smart grids …
manufacturing systems, wireless network systems, power and energy systems, smart grids …
[HTML][HTML] SpecRep: Adversary Emulation Based on Attack Objective Specification in Heterogeneous Infrastructures
Cybercriminals have become an imperative threat because they target the most valuable
resource on earth, data. Organizations prepare against cyber attacks by creating Cyber …
resource on earth, data. Organizations prepare against cyber attacks by creating Cyber …
Automated adversary emulation for cyber-physical systems via reinforcement learning
Adversary emulation is an offensive exercise that provides a comprehensive assessment of
a system's resilience against cyber attacks. However, adversary emulation is typically a …
a system's resilience against cyber attacks. However, adversary emulation is typically a …
Active and Passive Defense Strategies of Cyber-Physical Power System against Cyber Attacks Considering Node Vulnerability
Z Qu, H Shi, Y Wang, G Yin, A Abu-Siada - Processes, 2022 - mdpi.com
Vulnerable parts in the cyber-physical power system can be maliciously attacked to trigger
cascading failures. This paper proposes a defense framework with active and passive …
cascading failures. This paper proposes a defense framework with active and passive …
Impact-driven sampling strategies for hybrid attack graphs
Cyber-Physical Systems (CPSs) have a large input space, with discrete and continuous
elements across multiple layers. Hybrid Attack Graphs (HAGs) provide a flexible and efficient …
elements across multiple layers. Hybrid Attack Graphs (HAGs) provide a flexible and efficient …
ICCPS: Impact discovery using causal inference for cyber attacks in CPSs
We propose a new method to quantify the impact of cyber attacks in Cyber Physical Systems
(CPSs). In particular, our method allows to identify the Design Parameter (DPs) affected due …
(CPSs). In particular, our method allows to identify the Design Parameter (DPs) affected due …
A Hybrid Attack Graph Analysis Method based on Model Checking
Y Ge, X Shen, B Xu, G He - … on Advanced Cloud and Big Data …, 2022 - ieeexplore.ieee.org
Attack graph is an essential tool for the security assessment of industrial Internet systems.
Unfortunately, the traditional attack graph mainly focuses on discrete information and cannot …
Unfortunately, the traditional attack graph mainly focuses on discrete information and cannot …
Community-based link-addition strategies for mitigating cascading failures in modern power systems
P Hu, L Lee - Processes, 2020 - mdpi.com
The propagation of cascading failures of modern power systems is mainly constrained by
the network topology and system parameter. In order to alleviate the cascading failure …
the network topology and system parameter. In order to alleviate the cascading failure …
[책][B] Adversarial Modeling in Game-Theoretic Frameworks for Securing Cyber-Physical Systems
S Banik - 2023 - search.proquest.com
In an era where intricate cyber and physical systems are integrated into daily life, the
imperative for controlling and optimizing them emerges as a critical avenue. This avenue …
imperative for controlling and optimizing them emerges as a critical avenue. This avenue …