Toward proactive, adaptive defense: A survey on moving target defense

JH Cho, DP Sharma, H Alavizadeh… - … Surveys & Tutorials, 2020 - ieeexplore.ieee.org
Reactive defense mechanisms, such as intrusion detection systems, have made significant
efforts to secure a system or network for the last several decades. However, the nature of …

A review of attack graph and attack tree visual syntax in cyber security

HS Lallie, K Debattista, J Bal - Computer Science Review, 2020 - Elsevier
Perceiving and understanding cyber-attacks can be a difficult task, and more effective
techniques are needed to aid cyber-attack perception. Attack modelling techniques (AMTs) …

Cyber security threat modeling based on the MITRE Enterprise ATT&CK Matrix

W **ong, E Legrand, O Åberg, R Lagerström - Software and Systems …, 2022 - Springer
Enterprise systems are growing in complexity, and the adoption of cloud and mobile
services has greatly increased the attack surface. To proactively address these security …

DAG-based attack and defense modeling: Don't miss the forest for the attack trees

B Kordy, L Piètre-Cambacédès, P Schweitzer - Computer science review, 2014 - Elsevier
This paper presents the current state of the art on attack and defense modeling approaches
that are based on directed acyclic graphs (DAGs). DAGs allow for a hierarchical …

OpenFlow: A security analysis

R Klöti, V Kotronis, P Smith - 2013 21st IEEE International …, 2013 - ieeexplore.ieee.org
Software Defined Networking (SDN) has been proposed as a drastic shift in the networking
paradigm, by decoupling network control from the data plane and making the switching …

A review of threat modelling approaches for APT-style attacks

M Tatam, B Shanmugam, S Azam, K Kannoorpatti - Heliyon, 2021 - cell.com
Threats are potential events, intentional or not, that compromise the confidentiality, integrity,
and/or availability of information systems. Defending against threats and attacks requires …

A framework for automating security analysis of the internet of things

M Ge, JB Hong, W Guttmann, DS Kim - Journal of Network and Computer …, 2017 - Elsevier
Abstract The Internet of Things (IoT) is enabling innovative applications in various domains.
Due to its heterogeneous and wide-scale structure, it introduces many new security issues …

Foundations of attack–defense trees

B Kordy, S Mauw, S Radomirović… - Formal Aspects of Security …, 2011 - Springer
We introduce and give formal definitions of attack–defense trees. We argue that these trees
are a simple, yet powerful tool to analyze complex security and privacy problems. Our …

Traceability in supply chains: A Cyber security analysis

NF Syed, SW Shah, R Trujillo-Rasua, R Doss - Computers & Security, 2022 - Elsevier
Digital technologies are increasingly being adopted in modern supply chains for product
traceability, enabling data sharing amongst trading partners, quick availability of product …

Attack–defense trees

B Kordy, S Mauw, S Radomirović… - Journal of Logic and …, 2014 - academic.oup.com
Attack–defense trees are a novel methodology for graphical security modelling and
assessment. They extend the well-known formalism of attack trees by allowing nodes that …