A review of attack graph and attack tree visual syntax in cyber security

HS Lallie, K Debattista, J Bal - Computer Science Review, 2020 - Elsevier
Perceiving and understanding cyber-attacks can be a difficult task, and more effective
techniques are needed to aid cyber-attack perception. Attack modelling techniques (AMTs) …

DAG-based attack and defense modeling: Don't miss the forest for the attack trees

B Kordy, L Piètre-Cambacédès, P Schweitzer - Computer science review, 2014 - Elsevier
This paper presents the current state of the art on attack and defense modeling approaches
that are based on directed acyclic graphs (DAGs). DAGs allow for a hierarchical …

An attack surface metric

PK Manadhata, JM Wing - IEEE Transactions on Software …, 2010 - ieeexplore.ieee.org
Measurement of software security is a long-standing challenge to the research community.
At the same time, practical security metrics and measurements are essential for secure …

Experimenting with quantitative evaluation tools for monitoring operational security

R Ortalo, Y Deswarte… - IEEE Transactions on …, 1999 - ieeexplore.ieee.org
This paper presents the results of an experiment in security evaluation. The system is
modeled as a privilege graph that exhibits its security vulnerabilities. Quantitative measures …

A review of information security issues and respective research contributions

MT Siponen, H Oinas-Kukkonen - ACM SIGMIS Database: the …, 2007 - dl.acm.org
This paper identifies four security issues (access to Information Systems, secure
communication, security management, development of secure Information Systems), and …

Model-based security metrics using adversary view security evaluation (advise)

E LeMay, MD Ford, K Keefe… - 2011 Eighth …, 2011 - ieeexplore.ieee.org
System architects need quantitative security metrics to make informed trade-off decisions
involving system security. The security metrics need to provide insight on weak points in the …

Cyber attack exposure evaluation framework for the smart grid

A Hahn, M Govindarasu - IEEE Transactions on Smart Grid, 2011 - ieeexplore.ieee.org
The smart grid's heavy reliance on cyber resources introduces numerous security concerns.
The substantial attack surface presented by the advanced metering infrastructure (AMI) …

Towards a theory of insider threat assessment

R Chinchani, A Iyer, HQ Ngo… - … Systems and Networks …, 2005 - ieeexplore.ieee.org
Insider attacks are a well-known problem acknowledged as a threat as early as 1980s. The
threat is attributed to legitimate users who abuse their privileges, and given their familiarity …

A survey on the usability and practical applications of graphical security models

JB Hong, DS Kim, CJ Chung, D Huang - Computer Science Review, 2017 - Elsevier
This paper presents and discusses the current state of Graphical Security Models (GrSM), in
terms of four GrSM phases:(i) generation,(ii) representation,(iii) evaluation, and (iv) …

[HTML][HTML] An evaluation of potential attack surfaces based on attack tree modelling and risk matrix applied to self-sovereign identity

N Naik, P Grace, P Jenkins, K Naik, J Song - Computers & Security, 2022 - Elsevier
Abstract Self-Sovereign Identity (SSI) empowers users to govern their digital identity and
personal data. This approach has changed the identity paradigm where users become the …