Sok: The mitre att&ck framework in research and practice
The MITRE ATT&CK framework, a comprehensive knowledge base of adversary tactics and
techniques, has been widely adopted by the cybersecurity industry as well as by academic …
techniques, has been widely adopted by the cybersecurity industry as well as by academic …
Contextual remediations prioritization system designed to implement theoretical principles of CVSS v4
O Grigorescu, LF Botezatu, A Mutu… - UPB Scientific Bulletin …, 2024 - ibn.idsi.md
Technological advancements have led to an unprecedented expansion in the number and
complexity of device interconnections. This brisk pace of adoption, while indicative of …
complexity of device interconnections. This brisk pace of adoption, while indicative of …
A Study of Different Awareness Campaigns in a Company
L Gamisch, D Pöhn - Proceedings of the 18th International Conference …, 2023 - dl.acm.org
Phishing is a major cyber threat to organizations that can cause financial and reputational
damage, threatening their existence. The technical measures against phishing should be …
damage, threatening their existence. The technical measures against phishing should be …
Severity-based triage of cybersecurity incidents using kill chain attack graphs
Security teams process a vast number of security events. Their security analysts spend
considerable time triaging cybersecurity alerts. Many alerts reveal incidents that must be …
considerable time triaging cybersecurity alerts. Many alerts reveal incidents that must be …
Surgical immunization strategies against lateral movement in Active Directory environments
Lateral movement, in which a cyber attacker progresses through an enterprise network in
order to compromise its most valuable assets, is a key stage of any intrusion nowadays …
order to compromise its most valuable assets, is a key stage of any intrusion nowadays …
Adversary Tactic Driven Scenario and Terrain Generation with Partial Infrastructure Specification
Diverse, accurate, and up-to-date training environments are essential for training
cybersecurity experts and autonomous systems. However, preparation of their content is …
cybersecurity experts and autonomous systems. However, preparation of their content is …
Hierarchical Modeling of Cyber Assets in Kill Chain Attack Graphs
Cyber threat modeling is a proactive method for identifying possible cyber attacks on
network infrastructure that has a wide range of applications in security assessment, risk …
network infrastructure that has a wide range of applications in security assessment, risk …
Boosting D3FEND: Ontological analysis and recommendations
Formal Ontology is a discipline whose business is to develop formal theories about general
aspects of reality such as identity, dependence, parthood, truthmaking, causality, etc. A …
aspects of reality such as identity, dependence, parthood, truthmaking, causality, etc. A …
Optimal Attack Path Planning based on Reinforcement Learning and Cyber Threat Knowledge Graph Combining the ATT&CK for Air Traffic Management System
C Liu, B Wang, F Li, J Tian, Y Yang… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
With the development of the Air Traffic Management System (ATM), the ATM network has
transitioned from a closed physical isolation network to an open Cyber-Physical System …
transitioned from a closed physical isolation network to an open Cyber-Physical System …
[HTML][HTML] Enhancing Cybersecurity through Comprehensive Investigation of Data Flow-Based Attack Scenarios
S Abbaspour Asadollah, S Imtiaz… - … of Cybersecurity and …, 2024 - mdpi.com
Integration of the Internet of Things (IoT) in industrial settings necessitates robust
cybersecurity measures to mitigate risks such as data leakage, vulnerability exploitation, and …
cybersecurity measures to mitigate risks such as data leakage, vulnerability exploitation, and …