A survey of moving target defenses for network security

S Sengupta, A Chowdhary, A Sabur… - … Surveys & Tutorials, 2020 - ieeexplore.ieee.org
Network defenses based on traditional tools, techniques, and procedures (TTP) fail to
account for the attacker's inherent advantage present due to the static nature of network …

DAG-based attack and defense modeling: Don't miss the forest for the attack trees

B Kordy, L Piètre-Cambacédès, P Schweitzer - Computer science review, 2014 - Elsevier
This paper presents the current state of the art on attack and defense modeling approaches
that are based on directed acyclic graphs (DAGs). DAGs allow for a hierarchical …

[HTML][HTML] Connected and autonomous vehicles: A cyber-risk classification framework

B Sheehan, F Murphy, M Mullins, C Ryan - Transportation research part A …, 2019 - Elsevier
The proliferation of technologies embedded in connected and autonomous vehicles (CAVs)
increases the potential of cyber-attacks. The communication systems between vehicles and …

Taxonomy of information security risk assessment (ISRA)

A Shameli-Sendi, R Aghababaei-Barzegar… - Computers & …, 2016 - Elsevier
Abstract Information is a perennially significant business asset in all organizations.
Therefore, it must be protected as any other valuable asset. This is the objective of …

Security vulnerabilities in healthcare: an analysis of medical devices and software

CM Mejía-Granda, JL Fernández-Alemán… - Medical & biological …, 2024 - Springer
The integration of IoT in healthcare has introduced vulnerabilities in medical devices and
software, posing risks to patient safety and system integrity. This study aims to bridge the …

Security events and vulnerability data for cybersecurity risk estimation

L Allodi, F Massacci - Risk Analysis, 2017 - Wiley Online Library
Current industry standards for estimating cybersecurity risk are based on qualitative risk
matrices as opposed to quantitative risk estimates. In contrast, risk assessment in most other …

Comparing vulnerability severity and exploits using case-control studies

L Allodi, F Massacci - ACM Transactions on Information and System …, 2014 - dl.acm.org
(US) Rule-based policies for mitigating software risk suggest using the CVSS score to
measure the risk of an individual vulnerability and act accordingly. A key issue is whether …

Cyber risk management for autonomous passenger ships using threat-informed defense-in-depth

A Amro, V Gkioulos - International Journal of Information Security, 2023 - Springer
Recent innovations in the smart city domain have led to the proposition of a new mode of
transportation utilizing Autonomous Passenger Ships (APS) or ferries in inland waterways …

Can the common vulnerability scoring system be trusted? a bayesian analysis

P Johnson, R Lagerström, M Ekstedt… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
The Common Vulnerability Scoring System (CVSS) is the state-of-the art system for
assessing software vulnerabilities. However, it has been criticized for lack of validity and …

Assessing cyber risk in cyber-physical systems using the ATT&CK framework

A Amro, V Gkioulos, S Katsikas - ACM Transactions on Privacy and …, 2023 - dl.acm.org
Autonomous transport is receiving increasing attention, with research and development
activities already providing prototype implementations. In this article we focus on …