A review of attack graph and attack tree visual syntax in cyber security
Perceiving and understanding cyber-attacks can be a difficult task, and more effective
techniques are needed to aid cyber-attack perception. Attack modelling techniques (AMTs) …
techniques are needed to aid cyber-attack perception. Attack modelling techniques (AMTs) …
Quantitative security and safety analysis with attack-fault trees
R Kumar, M Stoelinga - 2017 IEEE 18th International …, 2017 - ieeexplore.ieee.org
Cyber physical systems, like power plants, medical devices and data centers have to meet
high standards, both in terms of safety (ie absence of unintentional failures) and security (ie …
high standards, both in terms of safety (ie absence of unintentional failures) and security (ie …
Modeling and defense of social virtual reality attacks inducing cybersickness
S Valluripally, A Gulhane, KA Hoque… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Social Virtual Reality Learning Environments (VRLE) offer a new medium for flexible and
immersive learning environments with geo-distributed users. Ensuring user safety in VRLE …
immersive learning environments with geo-distributed users. Ensuring user safety in VRLE …
Efficient and generic algorithms for quantitative attack tree analysis
M Lopuhaä-Zwakenberg, CE Budde… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Numerous analysis methods for quantitative attack tree analysis have been proposed.
These algorithms compute relevant security metrics, ie, performance indicators that quantify …
These algorithms compute relevant security metrics, ie, performance indicators that quantify …
Modelling attack-defense trees using timed automata
Performing a thorough security risk assessment of an organisation has always been
challenging, but with the increased reliance on outsourced and off-site third-party services …
challenging, but with the increased reliance on outsourced and off-site third-party services …
A systematic evaluation of cybersecurity metrics for dynamic networks
It is difficult to assess the security of modern networks because they are usually dynamic
with configuration changes (such as changes in topology, firewall rules, etc). Graphical …
with configuration changes (such as changes in topology, firewall rules, etc). Graphical …
The value of attack-defence diagrams
Success or failure of attacks on high-security systems, such as hacker attacks on sensitive
data, depend on various situational conditions, including the timing and success chances of …
data, depend on various situational conditions, including the timing and success chances of …
SAVTA: A hybrid vehicular threat model: Overview and case study
M Hamad, V Prevelakis - Information, 2020 - mdpi.com
In recent years, significant developments were introduced within the vehicular domain,
evolving the vehicles to become a network of many embedded systems which depend on a …
evolving the vehicles to become a network of many embedded systems which depend on a …
[PDF][PDF] Effective analysis of attack trees: A model-driven approach
Attack trees (ATs) are a popular formalism for security analysis, and numerous variations
and tools have been developed around them. These were mostly developed independently …
and tools have been developed around them. These were mostly developed independently …
Efficient algorithms for quantitative attack tree analysis
CE Budde, M Stoelinga - 2021 IEEE 34th Computer Security …, 2021 - ieeexplore.ieee.org
Numerous analysis methods for quantitative attack tree analysis have been proposed.
These algorithms compute relevant security metrics, ie performance indicators that quantity …
These algorithms compute relevant security metrics, ie performance indicators that quantity …