A conceptual system dynamics model for cybersecurity assessment of connected and autonomous vehicles

SK Khan, N Shiwakoti, P Stasinopoulos - Accident Analysis & Prevention, 2022 - Elsevier
Abstract Emerging Connected and Autonomous Vehicles (CAVs) technology have a
ubiquitous communication framework. It poses security challenges in the form of cyber …

Offensive security: Towards proactive threat hunting via adversary emulation

AB Ajmal, MA Shah, C Maple, MN Asghar… - IEEE Access, 2021 - ieeexplore.ieee.org
Attackers increasingly seek to compromise organizations and their critical data with
advanced stealthy methods, often utilising legitimate tools. In the main, organisations …

[HTML][HTML] Cybersecurity framework for connected and automated vehicles: A modelling perspective

SK Khan, N Shiwakoti, P Stasinopoulos, Y Chen… - Transport Policy, 2025 - Elsevier
Abstract Connected and Automated Vehicles (CAVs) cybersecurity is an inherently complex,
multi-dimensional issue that goes beyond isolated hardware or software vulnerabilities …

Probabilistic attack sequence generation and execution based on mitre att&ck for ics datasets

S Choi, JH Yun, BG Min - Proceedings of the 14th Cyber Security …, 2021 - dl.acm.org
To practically leverage a dataset, various attack situations should be created according to
the user's objective and how realistic the generated attack sequence is should be …

Analysis of cyber threat detection and emulation using mitre attack framework

P Rajesh, M Alam, M Tahernezhadi… - … on Intelligent Data …, 2022 - ieeexplore.ieee.org
With a rapid increase in Cyber-attacks, Threat hunters such as Cyber Threat Intelligence
(CTI) and their teams requires to analyze different techniques being employed by …

[HTML][HTML] Simulation of multi-stage attack and defense mechanisms in smart grids

Ö Sen, B Ivanov, C Kloos, C Zöll, P Lutat… - International Journal of …, 2025 - Elsevier
The power grid is a vital infrastructure in modern society, essential for ensuring public safety
and welfare. As it increasingly relies on digital technologies for its operation, it becomes …

Employing Deep Reinforcement Learning to Cyber-Attack Simulation for Enhancing Cybersecurity

SH Oh, J Kim, JH Nah, J Park - Electronics, 2024 - mdpi.com
In the current landscape where cybersecurity threats are escalating in complexity and
frequency, traditional defense mechanisms like rule-based firewalls and signature-based …

[PDF][PDF] Caldera: A red-blue cyber operations automation platform

R Alford, D Lawrence… - … : Bedford, MA, USA, 2022 - icaps22.icaps-conference.org
Live evaluation of cybersecurity defenses, or red team engagements, can be costly, difficult
to commission, and inconsistent in scope, detail, and results. This high overhead prevents …

Applying Reinforcement Learning for Enhanced Cybersecurity against Adversarial Simulation

SH Oh, MK Jeong, HC Kim, J Park - Sensors, 2023 - mdpi.com
Cybersecurity is a growing concern in today's interconnected world. Traditional
cybersecurity approaches, such as signature-based detection and rule-based firewalls, are …

Generation of cyberattacks leading to safety top event using altarica: an automotive case study

T Serru, N Nguyen, M Batteux, A Rauzy… - 23e Congrès de …, 2022 - hal.science
Cyber-Physical Systems (CPS) are safety critical as they can be at risk for their users and
environment. It is thus paramount to assess all risks related to their use, including the risks of …