Cyber-physical power system (CPPS): A review on modeling, simulation, and analysis with cyber security applications
Cyber-Physical System (CPS) is a new kind of digital technology that increases its attention
across academia, government, and industry sectors and covers a wide range of applications …
across academia, government, and industry sectors and covers a wide range of applications …
A review of attack graph and attack tree visual syntax in cyber security
Perceiving and understanding cyber-attacks can be a difficult task, and more effective
techniques are needed to aid cyber-attack perception. Attack modelling techniques (AMTs) …
techniques are needed to aid cyber-attack perception. Attack modelling techniques (AMTs) …
Artificial intelligence enabled cyber security defense for smart cities: A novel attack detection framework based on the MDATA model
Smart cities have attracted a lot of attention from interdisciplinary research, and plenty of
artificial intelligence based solutions have been proposed. However, cyber security has …
artificial intelligence based solutions have been proposed. However, cyber security has …
[HTML][HTML] Attack dynamics: An automatic attack graph generation framework based on system topology, CAPEC, CWE, and CVE databases
Through a built-in security analysis feature based on metadata, this article provides a novel
framework that starts with a scenario input and produces a collection of visualizations based …
framework that starts with a scenario input and produces a collection of visualizations based …
A survey on policies, modelling and security of cyber‐physical systems in smart grids
A more reliable, efficient, and resilient smart grid depends on the applications of advanced
information and communication technologies to support new functions and controls. The …
information and communication technologies to support new functions and controls. The …
Including insider threats into risk management through Bayesian threat graph networks
Cybersecurity incidents do represent a serious danger for companies. In fact, the number of
cyber crimes is exponentially growing in a scenario where the global COVID-19 pandemic …
cyber crimes is exponentially growing in a scenario where the global COVID-19 pandemic …
Attack graph analysis: An explanatory guide
K Zenitani - Computers & Security, 2023 - Elsevier
Attack graph analysis is a model-based approach for network-security analysis. It analyzes a
directed graph called an attack graph. Usually, each node in it corresponds to a malicious …
directed graph called an attack graph. Usually, each node in it corresponds to a malicious …
An empirical evaluation of the effectiveness of attack graphs and MITRE ATT&CK matrices in aiding cyber attack perception amongst decision-makers
AM Pirca, HS Lallie - Computers & Security, 2023 - Elsevier
Decision-makers struggle to understand cyber-security reports, sometimes leading to
inadequate cyber-attack responses. Attack modelling techniques (AMTs) can aid cyber …
inadequate cyber-attack responses. Attack modelling techniques (AMTs) can aid cyber …
An intelligence-driven security-aware defense mechanism for advanced persistent threats
Combined with many different attack forms, advanced persistent threats (APTs) are
becoming a major threat to cyber security. Existing security protection works typically either …
becoming a major threat to cyber security. Existing security protection works typically either …
[HTML][HTML] AttacKG+: Boosting attack graph construction with Large Language Models
Attack graph construction seeks to convert textual cyber threat intelligence (CTI) reports into
structured representations, portraying the evolutionary traces of cyber attacks. Even though …
structured representations, portraying the evolutionary traces of cyber attacks. Even though …