Attack projection
Having dedicated the previous chapter to the second level of SA, we now proceed to the
third level. The highest level of SA—projection—involves envisioning how the current …
third level. The highest level of SA—projection—involves envisioning how the current …
[HTML][HTML] Machine learning cyberattack and defense strategies
JA Bland, MD Petty, TS Whitaker, KP Maxwell… - Computers & …, 2020 - Elsevier
Cybersecurity is an increasingly important challenge for computer systems. In this work,
cyberattacks were modeled using an extension of the well-known Petri net formalism. That …
cyberattacks were modeled using an extension of the well-known Petri net formalism. That …
Synergy of building cybersecurity systems
The development of the modern world community is closely related to advances in
computing resources and cyberspace. The formation and expansion of the range of services …
computing resources and cyberspace. The formation and expansion of the range of services …
Context model fusion for multistage network attack simulation
S Moskal, B Wheeler, D Kreider… - 2014 IEEE Military …, 2014 - ieeexplore.ieee.org
Analyzing and predicting complex network attack strategies require an efficient way to
produce realistic and up-to-date data representing a variety of attack behaviors on diverse …
produce realistic and up-to-date data representing a variety of attack behaviors on diverse …
The cyber simulation terrain: Towards an open source cyber effects simulation ontology
K O'Sullivan, B Turnbull - 2015 - ro.ecu.edu.au
Cyber resilience is characterised by an ability to understand and adapt to changing network
conditions, including cyber attacks. Cyber resilience may be characterised by an effects …
conditions, including cyber attacks. Cyber resilience may be characterised by an effects …
[BOOK][B] A computer network model for the evaluation of moving target network defense mechanisms
BF Wheeler - 2014 - search.proquest.com
In order to combat the increasing complexity of cyber attacks, a new category of cyber
defense called dynamic cyber defense has been the focus of a significant amount of work …
defense called dynamic cyber defense has been the focus of a significant amount of work …
Development of the space-time structure of the methodology for modeling the behavior of antagonistic agents of the security system
O Milov, A Hrebeniuk, A Nalyvaiko… - … -European Journal of …, 2020 - papers.ssrn.com
The rapid development of computer technology, the emergence of modern cyber threats with
signs of hybridity and synergy put forward strict requirements for the economic component of …
signs of hybridity and synergy put forward strict requirements for the economic component of …
SYNERGY OF BUILDING CYBERSECURITY SYSTEMS
Y Serhii, P Volodymir, L Oleksandr, M Oleksandr… - 2021 - neliti.com
The development of the modern world community is closely related to advances in
computing resources and cyberspace. The formation and expansion of the range of services …
computing resources and cyberspace. The formation and expansion of the range of services …
[PDF][PDF] Published in 2021 by PC TECHNOLOGY CENTER Shatylova dacha str., 4, Kharkiv, Ukraine, 61165 Approved by the Academic Council of Simon Kuznets …
N Lukova-Chuiko - 2021 - researchgate.net
A feature of the present time is the transition from an industrial society to an informational
one. At the same time, information becomes a more important resource than material or …
one. At the same time, information becomes a more important resource than material or …
Siber güvenlik analizi için yeni bir siber saldırı simülatörü geliştirilmesi= Design and implementation of a new cyber attack simulator for cyber security analysis
Ş Kara - 2022 - acikerisim.sakarya.edu.tr
Kurumların ve bireylerin iş süreçlerini bilişim teknolojileri ile yürütme zorunluluğu
beraberinde risk ve tehditleri de getirmiştir. Siber saldırılar, kurtarılması zor sonuçlara yol …
beraberinde risk ve tehditleri de getirmiştir. Siber saldırılar, kurtarılması zor sonuçlara yol …