A survey on threat hunting in enterprise networks

B Nour, M Pourzandi, M Debbabi - … Communications Surveys & …, 2023 - ieeexplore.ieee.org
With the rapidly evolving technological landscape, the huge development of the Internet of
Things, and the embracing of digital transformation, the world is witnessing an explosion in …

Container security: precaution levels, mitigation strategies, and research perspectives

DP VS, SC Sethuraman, MK Khan - Computers & Security, 2023 - Elsevier
The enterprise technique for application deployment has undergone a major transformation
during the past two decades. Using conventional techniques, software developers write …

[HTML][HTML] The meta attack language-a formal description

W Wideł, S Hacks, M Ekstedt, P Johnson… - Computers & …, 2023 - Elsevier
Nowadays, IT infrastructures are involved in making innumerable aspects of our lives
convenient, starting with water or energy distribution systems, and ending with e-commerce …

[HTML][HTML] Automatic verification and execution of cyber attack on iot devices

FL Færøy, MM Yamin, A Shukla, B Katt - Sensors, 2023 - mdpi.com
Internet of Things (IoT) devices are becoming a part of our daily life; from health monitors to
critical infrastructure, they are used everywhere. This makes them ideal targets for malicious …

Efficient and generic algorithms for quantitative attack tree analysis

M Lopuhaä-Zwakenberg, CE Budde… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Numerous analysis methods for quantitative attack tree analysis have been proposed.
These algorithms compute relevant security metrics, ie, performance indicators that quantify …

A review of generative models in generating synthetic attack data for cybersecurity

G Agrawal, A Kaur, S Myneni - Electronics, 2024 - mdpi.com
The ability of deep learning to process vast data and uncover concealed malicious patterns
has spurred the adoption of deep learning methods within the cybersecurity domain …

Timed automata as a formalism for expressing security: A survey on theory and practice

J Arcile, É André - ACM Computing Surveys, 2022 - dl.acm.org
Timed automata are a common formalism for the verification of concurrent systems subject to
timing constraints. They extend finite-state automata with clocks, that constrain the system …

[HTML][HTML] Survey: automatic generation of attack trees and attack graphs

AM Konsta, AL Lafuente, B Spiga, N Dragoni - Computers & Security, 2024 - Elsevier
Graphical security models constitute a well-known, user-friendly way to represent the
security of a system. These classes of models are used by security experts to identify …

Threat-modeling-guided trust-based task offloading for resource-constrained Internet of Things

M Bradbury, A Jhumka, T Watson, D Flores… - ACM Transactions on …, 2022 - dl.acm.org
There is an increasing demand for Internet of Things (IoT) networks consisting of resource-
constrained devices executing increasingly complex applications. Due to these resource …

Exploiting attack–defense trees to find an optimal set of countermeasures

B Fila, W Wideł - 2020 IEEE 33rd computer security …, 2020 - ieeexplore.ieee.org
Selecting the most pertinent countermeasures to secure a system is one of the ultimate
goals of risk assessment. In this context, it is important to rely on modeling methods that the …