A conceptual system dynamics model for cybersecurity assessment of connected and autonomous vehicles
Abstract Emerging Connected and Autonomous Vehicles (CAVs) technology have a
ubiquitous communication framework. It poses security challenges in the form of cyber …
ubiquitous communication framework. It poses security challenges in the form of cyber …
Offensive security: Towards proactive threat hunting via adversary emulation
Attackers increasingly seek to compromise organizations and their critical data with
advanced stealthy methods, often utilising legitimate tools. In the main, organisations …
advanced stealthy methods, often utilising legitimate tools. In the main, organisations …
[HTML][HTML] Cybersecurity framework for connected and automated vehicles: A modelling perspective
Abstract Connected and Automated Vehicles (CAVs) cybersecurity is an inherently complex,
multi-dimensional issue that goes beyond isolated hardware or software vulnerabilities …
multi-dimensional issue that goes beyond isolated hardware or software vulnerabilities …
Probabilistic attack sequence generation and execution based on mitre att&ck for ics datasets
To practically leverage a dataset, various attack situations should be created according to
the user's objective and how realistic the generated attack sequence is should be …
the user's objective and how realistic the generated attack sequence is should be …
Analysis of cyber threat detection and emulation using mitre attack framework
P Rajesh, M Alam, M Tahernezhadi… - … on Intelligent Data …, 2022 - ieeexplore.ieee.org
With a rapid increase in Cyber-attacks, Threat hunters such as Cyber Threat Intelligence
(CTI) and their teams requires to analyze different techniques being employed by …
(CTI) and their teams requires to analyze different techniques being employed by …
[HTML][HTML] Simulation of multi-stage attack and defense mechanisms in smart grids
The power grid is a vital infrastructure in modern society, essential for ensuring public safety
and welfare. As it increasingly relies on digital technologies for its operation, it becomes …
and welfare. As it increasingly relies on digital technologies for its operation, it becomes …
Employing Deep Reinforcement Learning to Cyber-Attack Simulation for Enhancing Cybersecurity
In the current landscape where cybersecurity threats are escalating in complexity and
frequency, traditional defense mechanisms like rule-based firewalls and signature-based …
frequency, traditional defense mechanisms like rule-based firewalls and signature-based …
[PDF][PDF] Caldera: A red-blue cyber operations automation platform
Live evaluation of cybersecurity defenses, or red team engagements, can be costly, difficult
to commission, and inconsistent in scope, detail, and results. This high overhead prevents …
to commission, and inconsistent in scope, detail, and results. This high overhead prevents …
Applying Reinforcement Learning for Enhanced Cybersecurity against Adversarial Simulation
Cybersecurity is a growing concern in today's interconnected world. Traditional
cybersecurity approaches, such as signature-based detection and rule-based firewalls, are …
cybersecurity approaches, such as signature-based detection and rule-based firewalls, are …
Generation of cyberattacks leading to safety top event using altarica: an automotive case study
T Serru, N Nguyen, M Batteux, A Rauzy… - 23e Congrès de …, 2022 - hal.science
Cyber-Physical Systems (CPS) are safety critical as they can be at risk for their users and
environment. It is thus paramount to assess all risks related to their use, including the risks of …
environment. It is thus paramount to assess all risks related to their use, including the risks of …