A review of attack graph and attack tree visual syntax in cyber security

HS Lallie, K Debattista, J Bal - Computer Science Review, 2020 - Elsevier
Perceiving and understanding cyber-attacks can be a difficult task, and more effective
techniques are needed to aid cyber-attack perception. Attack modelling techniques (AMTs) …

Side-channel attacks: Ten years after its publication and the impacts on cryptographic module security testing

YB Zhou, DG Feng - Cryptology ePrint Archive, 2005 - eprint.iacr.org
Side-channel attacks are easy-to-implement whilst powerful attacks against cryptographic
implementations, and their targets range from primitives, protocols, modules, and devices to …

[PDF][PDF] 层次化网络安全威胁态势量化评估方法

陈秀真, 郑庆华, 管晓宏[1, 林晨光 - 2006 - Citeseer
安全评估是贯穿信息系统生命周期的重要管理手段, 是制定和调整安全策略的基础和前提.
只有充分识别系统安全风险, 才能有针对性地采取有效的安全防范措施. 基于IDS (intrusion …

Resilience and survivability in communication networks: Strategies, principles, and survey of disciplines

JPG Sterbenz, D Hutchison, EK Çetinkaya, A Jabbar… - Computer …, 2010 - Elsevier
The Internet has become essential to all aspects of modern life, and thus the consequences
of network disruption have become increasingly severe. It is widely recognised that the …

Evaluation of network resilience, survivability, and disruption tolerance: analysis, topology generation, simulation, and experimentation

JPG Sterbenz, EK Çetinkaya, MA Hameed… - Telecommunication …, 2013 - Springer
As the Internet becomes increasingly important to all aspects of society, the consequences
of disruption become increasingly severe. Thus it is critical to increase the resilience and …

A cyber attack modeling and impact assessment framework

I Kotenko, A Chechulin - 2013 5th International Conference on …, 2013 - ieeexplore.ieee.org
The paper suggests a framework for cyber attack modeling and impact assessment. It is
supposed that the common approach to attack modeling and impact assessment is based …

Graph metrics for network robustness—a survey

M Oehlers, B Fabian - Mathematics, 2021 - mdpi.com
Research on the robustness of networks, and in particular the Internet, has gained critical
importance in recent decades because more and more individuals, societies and firms rely …

Empirical analysis of system-level vulnerability metrics through actual attacks

H Holm, M Ekstedt, D Andersson - IEEE Transactions on …, 2012 - ieeexplore.ieee.org
The Common Vulnerability Scoring System (CVSS) is a widely used and well-established
standard for classifying the severity of security vulnerabilities. For instance, all vulnerabilities …

Attack graph based evaluation of network security

I Kotenko, M Stepashkin - … and Multimedia Security: 10th IFIP TC-6 TC-11 …, 2006 - Springer
The perspective directions in evaluating network security are simulating possible
malefactor's actions, building the representation of these actions as attack graphs (trees …

[PDF][PDF] Attack modeling and security evaluation in SIEM systems

I Kotenko, A Chechulin - International Transactions on Systems Science …, 2012 - siwn.org.uk
The paper suggests a framework for attack modeling and security evaluation in Security
Information and Event Management (SIEM) systems applicable for future systems of the …