Survey of attack projection, prediction, and forecasting in cyber security

M Husák, J Komárková, E Bou-Harb… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
This paper provides a survey of prediction, and forecasting methods used in cyber security.
Four main tasks are discussed first, attack projection and intention recognition, in which …

Resilience analysis of cyber‐physical systems: A review of models and methods

B Cassottana, MM Roomi, D Mashima… - Risk …, 2023 - Wiley Online Library
Cyber‐physical systems (CPSs) are monitored and controlled by a computing and
communicating core. This cyber layer enables better management of the controlled …

Institutional strategies for cybersecurity in higher education institutions

ECK Cheng, T Wang - Information, 2022 - mdpi.com
Cybersecurity threats have grown exponentially, posing a heavy burden on organisations.
Higher Education Institutions (HEIs) are particularly vulnerable, and their cybersecurity …

Big data for cybersecurity: Vulnerability disclosure trends and dependencies

MJ Tang, M Alazab, Y Luo - IEEE Transactions on Big Data, 2017 - ieeexplore.ieee.org
Complex Big Data systems in modern organisations are progressively becoming attack
targets by existing and emerging threat agents. Elaborate and specialised attacks will …

A deep learning framework for predicting cyber attacks rates

X Fang, M Xu, S Xu, P Zhao - EURASIP Journal on Information security, 2019 - Springer
Like how useful weather forecasting is, the capability of forecasting or predicting cyber
threats can never be overestimated. Previous investigations show that cyber attack data …

Modeling and predicting cyber hacking breaches

M Xu, KM Schweitzer, RM Bateman… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Analyzing cyber incident data sets is an important method for deepening our understanding
of the evolution of the threat situation. This is a relatively new research topic, and many …

Stram: Measuring the trustworthiness of computer-based systems

JH Cho, S Xu, PM Hurley, M Mackay… - ACM Computing …, 2019 - dl.acm.org
Various system metrics have been proposed for measuring the quality of computer-based
systems, such as dependability and security metrics for estimating their performance and …

Modeling multivariate cybersecurity risks

C Peng, M Xu, S Xu, T Hu - Journal of Applied Statistics, 2018 - Taylor & Francis
Modeling cybersecurity risks is an important, yet challenging, problem. In this paper, we
initiate the study of modeling multivariate cybersecurity risks. We develop the first statistical …

A cyber security data triage operation retrieval system

C Zhong, T Lin, P Liu, J Yen, K Chen - Computers & Security, 2018 - Elsevier
Data triage is a fundamental stage of cyber defense analysis for achieving cyber situational
awareness in a Security Operations Center (SOC). It has a high requirement for cyber …

Modeling of intrusion and defense for assessment of cyber security at power substations

Y Chen, J Hong, CC Liu - IEEE Transactions on Smart Grid, 2016 - ieeexplore.ieee.org
Cyber intrusions to substations are critical issues to a power grid, which must be defended
and mitigated. Essentially, to better understand a cyber intrusion, reconnaissance activities …