A survey on threat hunting in enterprise networks
With the rapidly evolving technological landscape, the huge development of the Internet of
Things, and the embracing of digital transformation, the world is witnessing an explosion in …
Things, and the embracing of digital transformation, the world is witnessing an explosion in …
Container security: precaution levels, mitigation strategies, and research perspectives
The enterprise technique for application deployment has undergone a major transformation
during the past two decades. Using conventional techniques, software developers write …
during the past two decades. Using conventional techniques, software developers write …
[HTML][HTML] The meta attack language-a formal description
Nowadays, IT infrastructures are involved in making innumerable aspects of our lives
convenient, starting with water or energy distribution systems, and ending with e-commerce …
convenient, starting with water or energy distribution systems, and ending with e-commerce …
[HTML][HTML] Automatic verification and execution of cyber attack on iot devices
Internet of Things (IoT) devices are becoming a part of our daily life; from health monitors to
critical infrastructure, they are used everywhere. This makes them ideal targets for malicious …
critical infrastructure, they are used everywhere. This makes them ideal targets for malicious …
Efficient and generic algorithms for quantitative attack tree analysis
M Lopuhaä-Zwakenberg, CE Budde… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Numerous analysis methods for quantitative attack tree analysis have been proposed.
These algorithms compute relevant security metrics, ie, performance indicators that quantify …
These algorithms compute relevant security metrics, ie, performance indicators that quantify …
A review of generative models in generating synthetic attack data for cybersecurity
The ability of deep learning to process vast data and uncover concealed malicious patterns
has spurred the adoption of deep learning methods within the cybersecurity domain …
has spurred the adoption of deep learning methods within the cybersecurity domain …
Timed automata as a formalism for expressing security: A survey on theory and practice
J Arcile, É André - ACM Computing Surveys, 2022 - dl.acm.org
Timed automata are a common formalism for the verification of concurrent systems subject to
timing constraints. They extend finite-state automata with clocks, that constrain the system …
timing constraints. They extend finite-state automata with clocks, that constrain the system …
[HTML][HTML] Survey: automatic generation of attack trees and attack graphs
Graphical security models constitute a well-known, user-friendly way to represent the
security of a system. These classes of models are used by security experts to identify …
security of a system. These classes of models are used by security experts to identify …
Threat-modeling-guided trust-based task offloading for resource-constrained Internet of Things
There is an increasing demand for Internet of Things (IoT) networks consisting of resource-
constrained devices executing increasingly complex applications. Due to these resource …
constrained devices executing increasingly complex applications. Due to these resource …
Exploiting attack–defense trees to find an optimal set of countermeasures
B Fila, W Wideł - 2020 IEEE 33rd computer security …, 2020 - ieeexplore.ieee.org
Selecting the most pertinent countermeasures to secure a system is one of the ultimate
goals of risk assessment. In this context, it is important to rely on modeling methods that the …
goals of risk assessment. In this context, it is important to rely on modeling methods that the …