A review of attack graph and attack tree visual syntax in cyber security
Perceiving and understanding cyber-attacks can be a difficult task, and more effective
techniques are needed to aid cyber-attack perception. Attack modelling techniques (AMTs) …
techniques are needed to aid cyber-attack perception. Attack modelling techniques (AMTs) …
Quantified security is a weak hypothesis: a critical survey of results and assumptions
V Verendel - Proceedings of the 2009 workshop on New security …, 2009 - dl.acm.org
This paper critically surveys previous work on quantitative representation and analysis of
security. Such quantified security has been presented as a general approach to precisely …
security. Such quantified security has been presented as a general approach to precisely …
A taxonomy for attack graph generation and usage in network security
K Kaynar - Journal of Information Security and Applications, 2016 - Elsevier
Attack graphs model possible paths that a potential attacker can use to intrude into a target
network. They can be used in determining both proactive and reactive security measures …
network. They can be used in determining both proactive and reactive security measures …
A cyber attack modeling and impact assessment framework
The paper suggests a framework for cyber attack modeling and impact assessment. It is
supposed that the common approach to attack modeling and impact assessment is based …
supposed that the common approach to attack modeling and impact assessment is based …
HARMer: Cyber-attacks automation and evaluation
With the increasing growth of cyber-attack incidences, it is important to develop innovative
and effective techniques to assess and defend networked systems against cyber attacks …
and effective techniques to assess and defend networked systems against cyber attacks …
Distributed attack graph generation
K Kaynar, F Sivrikaya - IEEE Transactions on Dependable and …, 2015 - ieeexplore.ieee.org
Attack graphs show possible paths that an attacker can use to intrude into a target network
and gain privileges through series of vulnerability exploits. The computation of attack graphs …
and gain privileges through series of vulnerability exploits. The computation of attack graphs …
Are markets for vulnerabilities effective?
S Ransbotham, S Mitra, J Ramsey - Mis Quarterly, 2012 - JSTOR
Current reward structures in security vulnerability disclosure may be skewed toward
benefitting nefarious usage of vulnerability information rather than responsible disclosure …
benefitting nefarious usage of vulnerability information rather than responsible disclosure …
An empirical evaluation of the effectiveness of attack graphs and fault trees in cyber-attack perception
Perceiving and understanding cyber-attacks can be a difficult task. This problem is widely
recognized and welldocumented, and more effective techniques are needed to aid cyber …
recognized and welldocumented, and more effective techniques are needed to aid cyber …
Use of attack graphs in security systems
V Shandilya, CB Simmons… - Journal of Computer …, 2014 - Wiley Online Library
Attack graphs have been used to model the vulnerabilities of the systems and their potential
exploits. The successful exploits leading to the partial/total failure of the systems are subject …
exploits. The successful exploits leading to the partial/total failure of the systems are subject …
[PDF][PDF] Attack modeling and security evaluation in SIEM systems
The paper suggests a framework for attack modeling and security evaluation in Security
Information and Event Management (SIEM) systems applicable for future systems of the …
Information and Event Management (SIEM) systems applicable for future systems of the …