[HTML][HTML] Threat modeling of industrial control systems: A systematic literature review
Threat modeling is the process of identifying and mitigating potential threats to a system. It
was originally developed to enhance software security during the design phase but has …
was originally developed to enhance software security during the design phase but has …
Container security: precaution levels, mitigation strategies, and research perspectives
The enterprise technique for application deployment has undergone a major transformation
during the past two decades. Using conventional techniques, software developers write …
during the past two decades. Using conventional techniques, software developers write …
{PentestGPT}: Evaluating and harnessing large language models for automated penetration testing
Penetration testing, a crucial industrial practice for ensuring system security, has traditionally
resisted automation due to the extensive expertise required by human professionals. Large …
resisted automation due to the extensive expertise required by human professionals. Large …
Systematic literature review of security event correlation methods
Security event correlation approaches are necessary to detect and predict incremental
threats such as multi-step or targeted attacks (advanced persistent threats) and other causal …
threats such as multi-step or targeted attacks (advanced persistent threats) and other causal …
Pentestgpt: An llm-empowered automatic penetration testing tool
Penetration testing, a crucial industrial practice for ensuring system security, has traditionally
resisted automation due to the extensive expertise required by human professionals. Large …
resisted automation due to the extensive expertise required by human professionals. Large …
Intrusion response systems for cyber-physical systems: A comprehensive survey
Abstract Cyberattacks on Cyber-Physical Systems (CPS) are on the rise due to CPS
increased networked connectivity and may cause costly environmental hazards as well as …
increased networked connectivity and may cause costly environmental hazards as well as …
A survey on artificial intelligence techniques for security event correlation: models, challenges, and opportunities
Abstract Information systems need to process a large amount of event monitoring data. The
process of finding the relationships between events is called correlation, which creates a …
process of finding the relationships between events is called correlation, which creates a …
A key review on graph data science: The power of graphs in scientific studies
This comprehensive review provides an in-depth analysis of graph theory, various graph
types, and the role of graph visualization in scientific studies. Graphs serve as powerful tools …
types, and the role of graph visualization in scientific studies. Graphs serve as powerful tools …
A review on attack graph analysis for iot vulnerability assessment: challenges, open issues, and future directions
OSMBH Almazrouei, P Magalingam, MK Hasan… - IEEE …, 2023 - ieeexplore.ieee.org
Vulnerability assessment in industrial IoT networks is critical due to the evolving nature of
the domain and the increasing complexity of security threats. This study aims to address the …
the domain and the increasing complexity of security threats. This study aims to address the …
Optimal monitoring and attack detection of networks modeled by Bayesian attack graphs
Early attack detection is essential to ensure the security of complex networks, especially
those in critical infrastructures. This is particularly crucial in networks with multi-stage …
those in critical infrastructures. This is particularly crucial in networks with multi-stage …