Model-based quantitative network security metrics: A survey
A Ramos, M Lazar, R Holanda Filho… - … Surveys & Tutorials, 2017 - ieeexplore.ieee.org
Network security metrics (NSMs) based on models allow to quantitatively evaluate the
overall resilience of networked systems against attacks. For that reason, such metrics are of …
overall resilience of networked systems against attacks. For that reason, such metrics are of …
Analysis framework of network security situational awareness and comparison of implementation methods
Y Li, G Huang, C Wang, Y Li - EURASIP Journal on Wireless …, 2019 - Springer
Abstract Information technology has penetrated into all aspects of politics, economy, and
culture of the whole society. The information revolution has changed the way of …
culture of the whole society. The information revolution has changed the way of …
CyGraph: graph-based analytics and visualization for cybersecurity
This chapter describes CyGraph, a system for improving network security posture,
maintaining situational awareness in the face of cyberattacks, and focusing on protection of …
maintaining situational awareness in the face of cyberattacks, and focusing on protection of …
A taxonomy for attack graph generation and usage in network security
K Kaynar - Journal of Information Security and Applications, 2016 - Elsevier
Attack graphs model possible paths that a potential attacker can use to intrude into a target
network. They can be used in determining both proactive and reactive security measures …
network. They can be used in determining both proactive and reactive security measures …
Network diversity: a security metric for evaluating the resilience of networks against zero-day attacks
Diversity has long been regarded as a security mechanism for improving the resilience of
software and networks against various attacks. More recently, diversity has found new …
software and networks against various attacks. More recently, diversity has found new …
A comprehensive study on APT attacks and countermeasures for future networks and communications: challenges and solutions
Recently in the connected digital world, targeted attack has become one of the most serious
threats to conventional computing systems. Advanced persistent threat (APT) is currently …
threats to conventional computing systems. Advanced persistent threat (APT) is currently …
Power system reliability assessment incorporating cyber attacks against wind farm energy management systems
By exploiting the vulnerabilities in cyber components, an attacker could intrude in the wind
farm supervisory control and data acquisition (SCADA) system and energy management …
farm supervisory control and data acquisition (SCADA) system and energy management …