[HTML][HTML] Threat modeling of industrial control systems: A systematic literature review
Threat modeling is the process of identifying and mitigating potential threats to a system. It
was originally developed to enhance software security during the design phase but has …
was originally developed to enhance software security during the design phase but has …
Container security: precaution levels, mitigation strategies, and research perspectives
The enterprise technique for application deployment has undergone a major transformation
during the past two decades. Using conventional techniques, software developers write …
during the past two decades. Using conventional techniques, software developers write …
{PentestGPT}: Evaluating and Harnessing Large Language Models for Automated Penetration Testing
Penetration testing, a crucial industrial practice for ensuring system security, has traditionally
resisted automation due to the extensive expertise required by human professionals. Large …
resisted automation due to the extensive expertise required by human professionals. Large …
Systematic literature review of security event correlation methods
Security event correlation approaches are necessary to detect and predict incremental
threats such as multi-step or targeted attacks (advanced persistent threats) and other causal …
threats such as multi-step or targeted attacks (advanced persistent threats) and other causal …
Pentestgpt: An llm-empowered automatic penetration testing tool
Penetration testing, a crucial industrial practice for ensuring system security, has traditionally
resisted automation due to the extensive expertise required by human professionals. Large …
resisted automation due to the extensive expertise required by human professionals. Large …
Intrusion response systems for cyber-physical systems: A comprehensive survey
Abstract Cyberattacks on Cyber-Physical Systems (CPS) are on the rise due to CPS
increased networked connectivity and may cause costly environmental hazards as well as …
increased networked connectivity and may cause costly environmental hazards as well as …
A survey on artificial intelligence techniques for security event correlation: models, challenges, and opportunities
Abstract Information systems need to process a large amount of event monitoring data. The
process of finding the relationships between events is called correlation, which creates a …
process of finding the relationships between events is called correlation, which creates a …
A key review on graph data science: The power of graphs in scientific studies
This comprehensive review provides an in-depth analysis of graph theory, various graph
types, and the role of graph visualization in scientific studies. Graphs serve as powerful tools …
types, and the role of graph visualization in scientific studies. Graphs serve as powerful tools …
A review on attack graph analysis for iot vulnerability assessment: challenges, open issues, and future directions
OSMBH Almazrouei, P Magalingam, MK Hasan… - IEEE …, 2023 - ieeexplore.ieee.org
Vulnerability assessment in industrial IoT networks is critical due to the evolving nature of
the domain and the increasing complexity of security threats. This study aims to address the …
the domain and the increasing complexity of security threats. This study aims to address the …
Optimal monitoring and attack detection of networks modeled by Bayesian attack graphs
A Kazeminajafabadi, M Imani - Cybersecurity, 2023 - Springer
Early attack detection is essential to ensure the security of complex networks, especially
those in critical infrastructures. This is particularly crucial in networks with multi-stage …
those in critical infrastructures. This is particularly crucial in networks with multi-stage …