A review of attack graph and attack tree visual syntax in cyber security

HS Lallie, K Debattista, J Bal - Computer Science Review, 2020 - Elsevier
Perceiving and understanding cyber-attacks can be a difficult task, and more effective
techniques are needed to aid cyber-attack perception. Attack modelling techniques (AMTs) …

Quantitative security and safety analysis with attack-fault trees

R Kumar, M Stoelinga - 2017 IEEE 18th International …, 2017 - ieeexplore.ieee.org
Cyber physical systems, like power plants, medical devices and data centers have to meet
high standards, both in terms of safety (ie absence of unintentional failures) and security (ie …

Modeling and defense of social virtual reality attacks inducing cybersickness

S Valluripally, A Gulhane, KA Hoque… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Social Virtual Reality Learning Environments (VRLE) offer a new medium for flexible and
immersive learning environments with geo-distributed users. Ensuring user safety in VRLE …

Efficient and generic algorithms for quantitative attack tree analysis

M Lopuhaä-Zwakenberg, CE Budde… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Numerous analysis methods for quantitative attack tree analysis have been proposed.
These algorithms compute relevant security metrics, ie, performance indicators that quantify …

Modelling attack-defense trees using timed automata

O Gadyatskaya, RR Hansen, KG Larsen… - Formal Modeling and …, 2016 - Springer
Performing a thorough security risk assessment of an organisation has always been
challenging, but with the increased reliance on outsourced and off-site third-party services …

A systematic evaluation of cybersecurity metrics for dynamic networks

SY Enoch, M Ge, JB Hong, H Alzaid, DS Kim - Computer Networks, 2018 - Elsevier
It is difficult to assess the security of modern networks because they are usually dynamic
with configuration changes (such as changes in topology, firewall rules, etc). Graphical …

The value of attack-defence diagrams

H Hermanns, J Krämer, J Krčál, M Stoelinga - … , POST 2016, Held as Part of …, 2016 - Springer
Success or failure of attacks on high-security systems, such as hacker attacks on sensitive
data, depend on various situational conditions, including the timing and success chances of …

SAVTA: A hybrid vehicular threat model: Overview and case study

M Hamad, V Prevelakis - Information, 2020 - mdpi.com
In recent years, significant developments were introduced within the vehicular domain,
evolving the vehicles to become a network of many embedded systems which depend on a …

[PDF][PDF] Effective analysis of attack trees: A model-driven approach

R Kumar, S Schivo, E Ruijters, BM Yildiz… - … , FASE 2018, Held as …, 2018 - library.oapen.org
Attack trees (ATs) are a popular formalism for security analysis, and numerous variations
and tools have been developed around them. These were mostly developed independently …

Efficient algorithms for quantitative attack tree analysis

CE Budde, M Stoelinga - 2021 IEEE 34th Computer Security …, 2021 - ieeexplore.ieee.org
Numerous analysis methods for quantitative attack tree analysis have been proposed.
These algorithms compute relevant security metrics, ie performance indicators that quantity …