Interdicting attack graphs to protect organizations from cyber attacks: A bi-level defender–attacker model

AK Nandi, HR Medal, S Vadlamani - Computers & Operations Research, 2016 - Elsevier
Today's organizations are inherently open and connected, sharing knowledge and ideas in
order to remain innovative. As a result, these organizations are also more vulnerable to …

Cost-aware securing of IoT systems using attack graphs

B Yiğit, G Gür, F Alagöz, B Tellenbach - Ad Hoc Networks, 2019 - Elsevier
Abstract The Internet of Things (IoT) contains a diverse set of sensors, actuators and other
Internet-connected devices communicating, processing data and performing a multitude of …

Critical attacks set identification in attack graphs for computer and scada/ics networks

AT Al Ghazo, R Kumar - IEEE Transactions on Systems, Man …, 2023 - ieeexplore.ieee.org
Supervisory control and data acquisition/industrial control systems (SCADA/ICSs) networks
are becoming more vulnerable to attacks that exploit the interdependence of security …

Risk-averse bi-level stochastic network interdiction model for cyber-security risk management

TH Bhuiyan, HR Medal, AK Nandi… - International Journal of …, 2021 - Elsevier
This paper proposes a methodology to enable a risk-averse, resource constrained cyber
network defender to optimally deploy security countermeasures that protect against potential …

Empirical analysis of attack graphs for mitigating critical paths and vulnerabilities

U Garg, G Sikka, LK Awasthi - Computers & Security, 2018 - Elsevier
The proliferated complexity of network size together with the expeditious development of
software applications and their numerous vulnerabilities, security hardening is becoming a …

Learning attack trees by genetic algorithms

F Dorfhuber, J Eisentraut, J Křetínský - International Colloquium on …, 2023 - Springer
Attack trees are a graphical formalism for security assessment. They are particularly valued
for their explainability and high accessibility without security or formal methods expertise …

A systematic review of attack graph generation and analysis techniques

U Garg, G Sikka, LK Awasthi - Computer and Cyber Security, 2018 - taylorfrancis.com
This chapter discusses the systematic approach to gather an extensive database of
literatures focusing on the generation and analysis of attack graphs. As the technology is …

Network induction for epidemic profiles with a novel representation

M Timmins, D Ashlock - Biosystems, 2017 - Elsevier
Graphs can be used as contact networks in models of epidemic spread. Most research
seeks to extract the properties of an extant graph, derived from questionnaires or other …

Identification of critical-attacks set in an attack-graph

AT Al Ghazo, R Kumar - 2019 IEEE 10th Annual Ubiquitous …, 2019 - ieeexplore.ieee.org
SCADA/ICS (Supervisory Control and Data Acqui-sition/Industrial Control Systems)
networks are becoming targets of advanced multi-faceted attacks, and use of attack-graphs …

Integrated reliability assessment model for drinking water networks: A case study of the City of London, Canada

A Mohammed, K Kaddoura, T Zayed… - … of Performance of …, 2022 - ascelibrary.org
Water distribution networks (WDNs) are complex interconnected networks that require
extensive planning and maintenance to ensure good quality water is delivered to all …