A review of attack graph and attack tree visual syntax in cyber security

HS Lallie, K Debattista, J Bal - Computer Science Review, 2020 - Elsevier
Perceiving and understanding cyber-attacks can be a difficult task, and more effective
techniques are needed to aid cyber-attack perception. Attack modelling techniques (AMTs) …

A survey on systems security metrics

M Pendleton, R Garcia-Lebron, JH Cho… - ACM Computing Surveys …, 2016 - dl.acm.org
Security metrics have received significant attention. However, they have not been
systematically explored based on the understanding of attack-defense interactions, which …

The security and privacy of mobile-edge computing: An artificial intelligence perspective

C Wang, Z Yuan, P Zhou, Z Xu, R Li… - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
Mobile-edge computing (MEC) is a new computing paradigm that enables cloud computing
and information technology (IT) services to be delivered at the network's edge. By shifting …

Dynamic security risk management using bayesian attack graphs

N Poolsappasit, R Dewri, I Ray - IEEE Transactions on …, 2011 - ieeexplore.ieee.org
Security risk assessment and mitigation are two vital processes that need to be executed to
maintain a productive IT infrastructure. On one hand, models such as attack graphs and …

DAG-based attack and defense modeling: Don't miss the forest for the attack trees

B Kordy, L Piètre-Cambacédès, P Schweitzer - Computer science review, 2014 - Elsevier
This paper presents the current state of the art on attack and defense modeling approaches
that are based on directed acyclic graphs (DAGs). DAGs allow for a hierarchical …

NICE: Network intrusion detection and countermeasure selection in virtual network systems

CJ Chung, P Khatkar, T **ng, J Lee… - IEEE transactions on …, 2013 - ieeexplore.ieee.org
Cloud security is one of most important issues that has attracted a lot of research and
development effort in past few years. Particularly, attackers can explore vulnerabilities of a …

Power system reliability evaluation with SCADA cybersecurity considerations

Y Zhang, L Wang, Y **ang… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
As information and communication networks are highly interconnected with the power grid,
cyber security of the supervisory control and data acquisition (SCADA) system has become …

An attack graph-based probabilistic security metric

L Wang, T Islam, T Long, A Singhal… - Data and Applications …, 2008 - Springer
To protect critical resources in today's networked environments, it is desirable to quantify the
likelihood of potential multi-step attacks that combine multiple vulnerabilities. This now …

Using Bayesian networks for cyber security analysis

P **e, JH Li, X Ou, P Liu, R Levy - 2010 IEEE/IFIP international …, 2010 - ieeexplore.ieee.org
Capturing the uncertain aspects in cyber security is important for security analysis in
enterprise networks. However, there has been insufficient effort in studying what modeling …

A taxonomy for attack graph generation and usage in network security

K Kaynar - Journal of Information Security and Applications, 2016 - Elsevier
Attack graphs model possible paths that a potential attacker can use to intrude into a target
network. They can be used in determining both proactive and reactive security measures …