DAG-based attack and defense modeling: Don't miss the forest for the attack trees
B Kordy, L Piètre-Cambacédès, P Schweitzer - Computer science review, 2014 - Elsevier
This paper presents the current state of the art on attack and defense modeling approaches
that are based on directed acyclic graphs (DAGs). DAGs allow for a hierarchical …
that are based on directed acyclic graphs (DAGs). DAGs allow for a hierarchical …
APT datasets and attack modeling for automated detection methods: A review
B Stojanović, K Hofer-Schmitz, U Kleb - Computers & Security, 2020 - Elsevier
Automated detection methods for targeted cyber attacks are getting more and more
prominent. In order to test these methods properly, it is crucial to have a suitable dataset …
prominent. In order to test these methods properly, it is crucial to have a suitable dataset …
A measurement study on linux container security: Attacks and countermeasures
X Lin, L Lei, Y Wang, J Jing, K Sun… - Proceedings of the 34th …, 2018 - dl.acm.org
Linux container mechanism has attracted a lot of attention and is increasingly utilized to
deploy industry applications. Though it is a consensus that the container mechanism is not …
deploy industry applications. Though it is a consensus that the container mechanism is not …
On the security of containers: Threat modeling, attack analysis, and mitigation strategies
Traditionally, applications that are used in large and small enterprises were deployed on
“bare metal” servers installed with operating systems. Recently, the use of multiple virtual …
“bare metal” servers installed with operating systems. Recently, the use of multiple virtual …
Cyber-attack modeling analysis techniques: An overview
H Al-Mohannadi, Q Mirza, A Namanya… - 2016 IEEE 4th …, 2016 - ieeexplore.ieee.org
Cyber attack is a sensitive issue in the world of Internet security. Governments and business
organisations around the world are providing enormous effort to secure their data. They are …
organisations around the world are providing enormous effort to secure their data. They are …
Building situational awareness for network threats in fog/edge computing: Emerging paradigms beyond the security perimeter model
The growing interest in fog and edge computing is gradually but inexorably outlining new
architectural and usage models, distinguished by geographical dispersion and device …
architectural and usage models, distinguished by geographical dispersion and device …
Cyber threat intelligence from honeypot data using elasticsearch
H Almohannadi, I Awan, J Al Hamar… - 2018 IEEE 32nd …, 2018 - ieeexplore.ieee.org
Cyber attacks are increasing in every aspect of daily life. There are a number of different
technologies around to tackle cyber-attacks, such as Intrusion Detection Systems (IDS) …
technologies around to tackle cyber-attacks, such as Intrusion Detection Systems (IDS) …
Defending against web application attacks: Approaches, challenges and implications
D Mitropoulos, P Louridas… - … on Dependable and …, 2017 - ieeexplore.ieee.org
Some of the most dangerous web attacks, such as Cross-Site Scripting and sql injection,
exploit vulnerabilities in web applications that may accept and process data of uncertain …
exploit vulnerabilities in web applications that may accept and process data of uncertain …
Secure cloud-based mobile apps: attack taxonomy, requirements, mechanisms, tests and automation
FT Chimuco, JBF Sequeiros, CG Lopes… - International Journal of …, 2023 - Springer
The adoption and popularization of mobile devices, such as smartphones and tablets,
accentuated after the second decade of this century, has been motivated by the growing …
accentuated after the second decade of this century, has been motivated by the growing …
Threat modeling of internet of things health devices
A Omotosho, B Ayemlo Haruna… - Journal of Applied …, 2019 - Taylor & Francis
For a number of health conditions, the number of Internet of Things (IoT) devices available
for self and remote monitoring are growing rapidly, and users are also increasing. In the …
for self and remote monitoring are growing rapidly, and users are also increasing. In the …