V2TSA: Analysis of Vulnerability to Attack Techniques using a Semantic Approach
DY Kim, SS Yoon, IC Euom - IEEE Access, 2024 - ieeexplore.ieee.org
In recent years, vulnerabilities in industrial control systems have increased substantially. The
operational environment's availability constraints hinder penetration testing from the …
operational environment's availability constraints hinder penetration testing from the …
Modeling for Identifying Attack Techniques Based on Semantic Vulnerability Analysis
DY Kim, SS Yoon, IC Euom - 2024 IEEE 12th International …, 2024 - ieeexplore.ieee.org
As attackers' techniques and tactics targeting Industrial Control Systems (ICS) become
increasingly diverse and sophisticated, attacker-centric security validation technologies are …
increasingly diverse and sophisticated, attacker-centric security validation technologies are …