A review of attack graph and attack tree visual syntax in cyber security

HS Lallie, K Debattista, J Bal - Computer Science Review, 2020 - Elsevier
Perceiving and understanding cyber-attacks can be a difficult task, and more effective
techniques are needed to aid cyber-attack perception. Attack modelling techniques (AMTs) …

DAG-based attack and defense modeling: Don't miss the forest for the attack trees

B Kordy, L Piètre-Cambacédès, P Schweitzer - Computer science review, 2014 - Elsevier
This paper presents the current state of the art on attack and defense modeling approaches
that are based on directed acyclic graphs (DAGs). DAGs allow for a hierarchical …

Automated security test generation with formal threat models

D Xu, M Tu, M Sanford, L Thomas… - IEEE transactions on …, 2012 - ieeexplore.ieee.org
Security attacks typically result from unintended behaviors or invalid inputs. Security testing
is labor intensive because a real-world program usually has too many invalid inputs. It is …

How well does llm generate security tests?

Y Zhang, W Song, Z Ji, N Meng - arxiv preprint arxiv:2310.00710, 2023 - arxiv.org
Developers often build software on top of third-party libraries (Libs) to improve programmer
productivity and software quality. The libraries may contain vulnerabilities exploitable by …

An empirical evaluation of the effectiveness of attack graphs and fault trees in cyber-attack perception

HS Lallie, K Debattista, J Bal - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Perceiving and understanding cyber-attacks can be a difficult task. This problem is widely
recognized and welldocumented, and more effective techniques are needed to aid cyber …

ASE: A comprehensive pattern-driven security methodology for distributed systems

AV Uzunov, EB Fernandez, K Falkner - Computer Standards & Interfaces, 2015 - Elsevier
Incorporating security features is one of the most important and challenging tasks in
designing distributed systems. Over the last decade, researchers and practitioners have …

Reinforcement learning architecture for web recommendations

N Golovin, E Rahm - International Conference on Information …, 2004 - ieeexplore.ieee.org
A large number of Web sites use online recommendations to make Web users interested in
their products or content. Since no single recommendation approach is always best it is …

Moderator factors of software security and performance verification

VV Ribeiro, DS Cruzes, GH Travassos - Journal of Systems and Software, 2022 - Elsevier
Context: Security and performance are critical software non-functional requirements.
Therefore, verification activities should be included in the development process to identify …

Attack model based penetration test for SQL injection vulnerability

W Tian, JF Yang, J Xu, GN Si - 2012 IEEE 36th annual …, 2012 - ieeexplore.ieee.org
The penetration test is a crucial way to enhance the security of web applications. Improving
accuracy is the core issue of the penetration test research. The test case is an important …

Knowledge-based security testing of web applications by logic programming

P Zech, M Felderer, R Breu - International Journal on Software Tools for …, 2019 - Springer
This article introduces a new method for knowledge-based security testing by logic
programming and the related tool implementation for model-based non-functional security …