[HTML][HTML] A review of cyber security risk assessment methods for SCADA systems

Y Cherdantseva, P Burnap, A Blyth, P Eden, K Jones… - Computers & …, 2016 - Elsevier
This paper reviews the state of the art in cyber security risk assessment of Supervisory
Control and Data Acquisition (SCADA) systems. We select and in-detail examine twenty-four …

A review of attack graph and attack tree visual syntax in cyber security

HS Lallie, K Debattista, J Bal - Computer Science Review, 2020 - Elsevier
Perceiving and understanding cyber-attacks can be a difficult task, and more effective
techniques are needed to aid cyber-attack perception. Attack modelling techniques (AMTs) …

DAG-based attack and defense modeling: Don't miss the forest for the attack trees

B Kordy, L Piètre-Cambacédès, P Schweitzer - Computer science review, 2014 - Elsevier
This paper presents the current state of the art on attack and defense modeling approaches
that are based on directed acyclic graphs (DAGs). DAGs allow for a hierarchical …

Cybersecurity for digital manufacturing

D Wu, A Ren, W Zhang, F Fan, P Liu, X Fu… - Journal of manufacturing …, 2018 - Elsevier
Digital manufacturing aims to create highly customizable products with higher quality and
lower costs by integrating Industrial Internet of Things, big data analytics, cloud computing …

A master attack methodology for an AI-based automated attack planner for smart cities

G Falco, A Viswanathan, C Caldera, H Shrobe - IEEE Access, 2018 - ieeexplore.ieee.org
America's critical infrastructure is becoming “smarter” and increasingly dependent on highly
specialized computers called industrial control systems (ICS). Networked ICS components …

A survey on the usability and practical applications of graphical security models

JB Hong, DS Kim, CJ Chung, D Huang - Computer Science Review, 2017 - Elsevier
This paper presents and discusses the current state of Graphical Security Models (GrSM), in
terms of four GrSM phases:(i) generation,(ii) representation,(iii) evaluation, and (iv) …

Bilevel programming and applications

VV Kalashnikov, S Dempe… - Mathematical …, 2015 - Wiley Online Library
A great amount of new applied problems in the area of energy networks has recently arisen
that can be efficiently solved only as mixed‐integer bilevel programs. Among them are the …

Dependability and security quantification of an internet of medical things infrastructure based on cloud-fog-edge continuum for healthcare monitoring using …

TA Nguyen, D Min, E Choi… - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
Rising aggressive virus pandemics urge to conduct studies on dependability and security of
modern computing systems to secure autonomous and continuous operations of healthcare …

A threat‐intelligence driven methodology to incorporate uncertainty in cyber risk analysis and enhance decision‐making

M Dekker, L Alevizos - Security and Privacy, 2024 - Wiley Online Library
The challenge of decision‐making under uncertainty in information security has become
increasingly important, given the unpredictable probabilities and effects of events in the ever …

Interdicting attack graphs to protect organizations from cyber attacks: A bi-level defender–attacker model

AK Nandi, HR Medal, S Vadlamani - Computers & Operations Research, 2016 - Elsevier
Today's organizations are inherently open and connected, sharing knowledge and ideas in
order to remain innovative. As a result, these organizations are also more vulnerable to …