A review of attack graph and attack tree visual syntax in cyber security

HS Lallie, K Debattista, J Bal - Computer Science Review, 2020‏ - Elsevier
Perceiving and understanding cyber-attacks can be a difficult task, and more effective
techniques are needed to aid cyber-attack perception. Attack modelling techniques (AMTs) …

Review of cybersecurity assessment methods: Applicability perspective

R Leszczyna - Computers & Security, 2021‏ - Elsevier
Cybersecurity assessments are crucial in building the assurance that vital cyberassets are
effectively protected from threats. Multiple assessment methods have been proposed during …

Attacks and defenses in short-range wireless technologies for IoT

K Lounis, M Zulkernine - IEEE Access, 2020‏ - ieeexplore.ieee.org
The Internet of Things, abbreviated as IoT, is a new networking paradigm composed of
wireless and wired networks, geographically distributed and interconnected by a “secured” …

Kubernetes in IT administration and serverless computing: An empirical study and research challenges

SK Mondal, R Pan, HMD Kabir, T Tian… - The Journal of …, 2022‏ - Springer
Today's industry has gradually realized the importance of lifting efficiency and saving costs
during the life-cycle of an application. In particular, we see that most of the cloud-based …

APT attacks on industrial control systems: A tale of three incidents

R Kumar, R Kela, S Singh, R Trujillo-Rasua - International Journal of …, 2022‏ - Elsevier
Modern-day industries are complex socio-technical entities. Understanding the risks
associated with the operation of such systems requires proper consideration of budget …

A survey on the usability and practical applications of graphical security models

JB Hong, DS Kim, CJ Chung, D Huang - Computer Science Review, 2017‏ - Elsevier
This paper presents and discusses the current state of Graphical Security Models (GrSM), in
terms of four GrSM phases:(i) generation,(ii) representation,(iii) evaluation, and (iv) …

Beyond 2014: Formal Methods for Attack Tree--based Security Modeling

W Wideł, M Audinot, B Fila, S Pinchinat - ACM Computing Surveys …, 2019‏ - dl.acm.org
Attack trees are a well established and commonly used framework for security modeling.
They provide a readable and structured representation of possible attacks against a system …

Efficient and generic algorithms for quantitative attack tree analysis

M Lopuhaä-Zwakenberg, CE Budde… - IEEE Transactions on …, 2022‏ - ieeexplore.ieee.org
Numerous analysis methods for quantitative attack tree analysis have been proposed.
These algorithms compute relevant security metrics, ie, performance indicators that quantify …

Cybersecurity vulnerability mitigation framework through empirical paradigm: Enhanced prioritized gap analysis

SNG Gourisetti, M Mylrea, H Patangia - Future Generation Computer …, 2020‏ - Elsevier
Existing cybersecurity vulnerability assessment tools were designed based on the policies
and standards defined by organizations such as the US Department of Energy and the …

Exploiting attack–defense trees to find an optimal set of countermeasures

B Fila, W Wideł - 2020 IEEE 33rd computer security …, 2020‏ - ieeexplore.ieee.org
Selecting the most pertinent countermeasures to secure a system is one of the ultimate
goals of risk assessment. In this context, it is important to rely on modeling methods that the …