GRAVITAS: Graphical reticulated attack vectors for Internet-of-Things aggregate security
Internet-of-Things (IoT) and cyber-physical systems (CPSs) may consist of thousands of
devices connected in a complex network topology. The diversity and complexity of these …
devices connected in a complex network topology. The diversity and complexity of these …
SHARKS: Smart hacking approaches for risk scanning in Internet-of-Things and cyber-physical systems based on machine learning
Cyber-physical systems (CPS) and Internet-of-Things (IoT) devices are increasingly being
deployed across multiple functionalities, ranging from healthcare devices and wearables to …
deployed across multiple functionalities, ranging from healthcare devices and wearables to …
Model-based cybersecurity analysis: past work and future directions
Summary & ConclusionsModel-based evaluation in cybersecurity has a long history. Attack
Graphs (AGs) and Attack Trees (ATs) were the earlier developed graphical security models …
Graphs (AGs) and Attack Trees (ATs) were the earlier developed graphical security models …
Prometheus: Infrastructure security posture analysis with ai-generated attack graphs
The rampant occurrence of cybersecurity breaches imposes substantial limitations on the
progress of network infrastructures, leading to compromised data, financial losses, potential …
progress of network infrastructures, leading to compromised data, financial losses, potential …
A2G2V: Automated attack graph generator and visualizer
The Internet of Things (IoT) and Cyber-Physical Systems (CPS) technologies have
increased the complexity of systems and also exposed them to additional vulnerabilities …
increased the complexity of systems and also exposed them to additional vulnerabilities …
HARMer: Cyber-attacks automation and evaluation
With the increasing growth of cyber-attack incidences, it is important to develop innovative
and effective techniques to assess and defend networked systems against cyber attacks …
and effective techniques to assess and defend networked systems against cyber attacks …
Risk assessment for IoT-enabled cyber-physical systems
Abstract Internet of Things (IoT) technologies have enabled Cyber-Physical Systems (CPS)
to become fully interconnected. This connectivity however has radically changed their threat …
to become fully interconnected. This connectivity however has radically changed their threat …
[HTML][HTML] IoT network security: Threats, risks, and a data-driven defense framework
The recent surge in Internet of Things (IoT) deployment has increased the pace of
integration and extended the reach of the Internet from computers, tablets and phones to a …
integration and extended the reach of the Internet from computers, tablets and phones to a …
Automated vulnerability testing via executable attack graphs
D Malzahn, Z Birnbaum… - … Conference on Cyber …, 2020 - ieeexplore.ieee.org
Cyber risk assessments are an essential process for analyzing and prioritizing security
issues. Unfortunately, many risk assessment methodologies are marred by human …
issues. Unfortunately, many risk assessment methodologies are marred by human …
Integrating redundancy, diversity, and hardening to improve security of industrial internet of things
ABSTRACT As the Industrial Internet of Things (IIoT) becomes more ubiquitous in critical
application domains, such as smart water-distribution and transportation systems, providing …
application domains, such as smart water-distribution and transportation systems, providing …