A review of attack graph and attack tree visual syntax in cyber security
Perceiving and understanding cyber-attacks can be a difficult task, and more effective
techniques are needed to aid cyber-attack perception. Attack modelling techniques (AMTs) …
techniques are needed to aid cyber-attack perception. Attack modelling techniques (AMTs) …
Side-channel attacks: Ten years after its publication and the impacts on cryptographic module security testing
YB Zhou, DG Feng - Cryptology ePrint Archive, 2005 - eprint.iacr.org
Side-channel attacks are easy-to-implement whilst powerful attacks against cryptographic
implementations, and their targets range from primitives, protocols, modules, and devices to …
implementations, and their targets range from primitives, protocols, modules, and devices to …
[PDF][PDF] 层次化网络安全威胁态势量化评估方法
陈秀真, 郑庆华, 管晓宏[1, 林晨光 - 2006 - Citeseer
安全评估是贯穿信息系统生命周期的重要管理手段, 是制定和调整安全策略的基础和前提.
只有充分识别系统安全风险, 才能有针对性地采取有效的安全防范措施. 基于IDS (intrusion …
只有充分识别系统安全风险, 才能有针对性地采取有效的安全防范措施. 基于IDS (intrusion …
Resilience and survivability in communication networks: Strategies, principles, and survey of disciplines
The Internet has become essential to all aspects of modern life, and thus the consequences
of network disruption have become increasingly severe. It is widely recognised that the …
of network disruption have become increasingly severe. It is widely recognised that the …
Evaluation of network resilience, survivability, and disruption tolerance: analysis, topology generation, simulation, and experimentation
As the Internet becomes increasingly important to all aspects of society, the consequences
of disruption become increasingly severe. Thus it is critical to increase the resilience and …
of disruption become increasingly severe. Thus it is critical to increase the resilience and …
A cyber attack modeling and impact assessment framework
I Kotenko, A Chechulin - 2013 5th International Conference on …, 2013 - ieeexplore.ieee.org
The paper suggests a framework for cyber attack modeling and impact assessment. It is
supposed that the common approach to attack modeling and impact assessment is based …
supposed that the common approach to attack modeling and impact assessment is based …
Graph metrics for network robustness—a survey
M Oehlers, B Fabian - Mathematics, 2021 - mdpi.com
Research on the robustness of networks, and in particular the Internet, has gained critical
importance in recent decades because more and more individuals, societies and firms rely …
importance in recent decades because more and more individuals, societies and firms rely …
Empirical analysis of system-level vulnerability metrics through actual attacks
The Common Vulnerability Scoring System (CVSS) is a widely used and well-established
standard for classifying the severity of security vulnerabilities. For instance, all vulnerabilities …
standard for classifying the severity of security vulnerabilities. For instance, all vulnerabilities …
Attack graph based evaluation of network security
I Kotenko, M Stepashkin - … and Multimedia Security: 10th IFIP TC-6 TC-11 …, 2006 - Springer
The perspective directions in evaluating network security are simulating possible
malefactor's actions, building the representation of these actions as attack graphs (trees …
malefactor's actions, building the representation of these actions as attack graphs (trees …
[PDF][PDF] Attack modeling and security evaluation in SIEM systems
I Kotenko, A Chechulin - International Transactions on Systems Science …, 2012 - siwn.org.uk
The paper suggests a framework for attack modeling and security evaluation in Security
Information and Event Management (SIEM) systems applicable for future systems of the …
Information and Event Management (SIEM) systems applicable for future systems of the …