GRAVITAS: Graphical reticulated attack vectors for Internet-of-Things aggregate security

J Brown, T Saha, NK Jha - IEEE Transactions on Emerging …, 2021 - ieeexplore.ieee.org
Internet-of-Things (IoT) and cyber-physical systems (CPSs) may consist of thousands of
devices connected in a complex network topology. The diversity and complexity of these …

SHARKS: Smart hacking approaches for risk scanning in Internet-of-Things and cyber-physical systems based on machine learning

T Saha, N Aaraj, N Ajjarapu… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Cyber-physical systems (CPS) and Internet-of-Things (IoT) devices are increasingly being
deployed across multiple functionalities, ranging from healthcare devices and wearables to …

Model-based cybersecurity analysis: past work and future directions

SY Enoch, M Ge, JB Hong… - 2021 Annual Reliability …, 2021 - ieeexplore.ieee.org
Summary & ConclusionsModel-based evaluation in cybersecurity has a long history. Attack
Graphs (AGs) and Attack Trees (ATs) were the earlier developed graphical security models …

Prometheus: Infrastructure security posture analysis with ai-generated attack graphs

X Jin, C Katsis, F Sang, J Sun, E Bertino… - arXiv preprint arXiv …, 2023 - arxiv.org
The rampant occurrence of cybersecurity breaches imposes substantial limitations on the
progress of network infrastructures, leading to compromised data, financial losses, potential …

A2G2V: Automated attack graph generator and visualizer

AT Al Ghazo, M Ibrahim, H Ren, R Kumar - Proceedings of the 1st ACM …, 2018 - dl.acm.org
The Internet of Things (IoT) and Cyber-Physical Systems (CPS) technologies have
increased the complexity of systems and also exposed them to additional vulnerabilities …

HARMer: Cyber-attacks automation and evaluation

SY Enoch, Z Huang, CY Moon, D Lee, MK Ahn… - IEEE …, 2020 - ieeexplore.ieee.org
With the increasing growth of cyber-attack incidences, it is important to develop innovative
and effective techniques to assess and defend networked systems against cyber attacks …

Risk assessment for IoT-enabled cyber-physical systems

I Stellios, P Kotzanikolaou, M Psarakis… - Advances in Core …, 2021 - Springer
Abstract Internet of Things (IoT) technologies have enabled Cyber-Physical Systems (CPS)
to become fully interconnected. This connectivity however has radically changed their threat …

[HTML][HTML] IoT network security: Threats, risks, and a data-driven defense framework

C Wheelus, X Zhu - IoT, 2020 - mdpi.com
The recent surge in Internet of Things (IoT) deployment has increased the pace of
integration and extended the reach of the Internet from computers, tablets and phones to a …

Automated vulnerability testing via executable attack graphs

D Malzahn, Z Birnbaum… - … Conference on Cyber …, 2020 - ieeexplore.ieee.org
Cyber risk assessments are an essential process for analyzing and prioritizing security
issues. Unfortunately, many risk assessment methodologies are marred by human …

Integrating redundancy, diversity, and hardening to improve security of industrial internet of things

A Laszka, W Abbas, Y Vorobeychik… - Cyber-Physical …, 2020 - Taylor & Francis
ABSTRACT As the Industrial Internet of Things (IIoT) becomes more ubiquitous in critical
application domains, such as smart water-distribution and transportation systems, providing …