Attack projection

SJ Yang, H Du, J Holsopple, M Sudit - Cyber Defense and Situational …, 2014 - Springer
Having dedicated the previous chapter to the second level of SA, we now proceed to the
third level. The highest level of SA—projection—involves envisioning how the current …

[HTML][HTML] Machine learning cyberattack and defense strategies

JA Bland, MD Petty, TS Whitaker, KP Maxwell… - Computers & …, 2020 - Elsevier
Cybersecurity is an increasingly important challenge for computer systems. In this work,
cyberattacks were modeled using an extension of the well-known Petri net formalism. That …

Synergy of building cybersecurity systems

S Yevseiev, V Ponomarenko, O Laptiev, O Milov… - 2021 - papers.ssrn.com
The development of the modern world community is closely related to advances in
computing resources and cyberspace. The formation and expansion of the range of services …

Context model fusion for multistage network attack simulation

S Moskal, B Wheeler, D Kreider… - 2014 IEEE Military …, 2014 - ieeexplore.ieee.org
Analyzing and predicting complex network attack strategies require an efficient way to
produce realistic and up-to-date data representing a variety of attack behaviors on diverse …

The cyber simulation terrain: Towards an open source cyber effects simulation ontology

K O'Sullivan, B Turnbull - 2015 - ro.ecu.edu.au
Cyber resilience is characterised by an ability to understand and adapt to changing network
conditions, including cyber attacks. Cyber resilience may be characterised by an effects …

[BOOK][B] A computer network model for the evaluation of moving target network defense mechanisms

BF Wheeler - 2014 - search.proquest.com
In order to combat the increasing complexity of cyber attacks, a new category of cyber
defense called dynamic cyber defense has been the focus of a significant amount of work …

Development of the space-time structure of the methodology for modeling the behavior of antagonistic agents of the security system

O Milov, A Hrebeniuk, A Nalyvaiko… - … -European Journal of …, 2020 - papers.ssrn.com
The rapid development of computer technology, the emergence of modern cyber threats with
signs of hybridity and synergy put forward strict requirements for the economic component of …

SYNERGY OF BUILDING CYBERSECURITY SYSTEMS

Y Serhii, P Volodymir, L Oleksandr, M Oleksandr… - 2021 - neliti.com
The development of the modern world community is closely related to advances in
computing resources and cyberspace. The formation and expansion of the range of services …

[PDF][PDF] Published in 2021 by PC TECHNOLOGY CENTER Shatylova dacha str., 4, Kharkiv, Ukraine, 61165 Approved by the Academic Council of Simon Kuznets …

N Lukova-Chuiko - 2021 - researchgate.net
A feature of the present time is the transition from an industrial society to an informational
one. At the same time, information becomes a more important resource than material or …

Siber güvenlik analizi için yeni bir siber saldırı simülatörü geliştirilmesi= Design and implementation of a new cyber attack simulator for cyber security analysis

Ş Kara - 2022 - acikerisim.sakarya.edu.tr
Kurumların ve bireylerin iş süreçlerini bilişim teknolojileri ile yürütme zorunluluğu
beraberinde risk ve tehditleri de getirmiştir. Siber saldırılar, kurtarılması zor sonuçlara yol …