[HTML][HTML] Threat modeling of industrial control systems: A systematic literature review
Threat modeling is the process of identifying and mitigating potential threats to a system. It
was originally developed to enhance software security during the design phase but has …
was originally developed to enhance software security during the design phase but has …
Enhancing AMI network security with STI model: A mathematical perspective
O Kornyo, BT Partey, M Asante, K Owusu-Agyemang… - Internet of Things, 2024 - Elsevier
The popularity of cyberspace is skyrocketing as the need to make systems digital,
transparent, and fast is becoming indispensable, increasing the need for enhanced security …
transparent, and fast is becoming indispensable, increasing the need for enhanced security …
A model-driven formal methods approach to software architectural security vulnerabilities specification and verification
Detecting and addressing security vulnerabilities in software designs is crucial for ensuring
the reliable and safe operation of systems. Existing approaches for vulnerability specification …
the reliable and safe operation of systems. Existing approaches for vulnerability specification …
Integrating the analysis of multiple non-functional properties in model-driven engineering
DC Petriu - Software and Systems Modeling, 2021 - Springer
This paper discusses the progress made so far and future challenges in integrating the
analysis of multiple Non-Functional Properties (NFP)(such as performance, schedulability …
analysis of multiple Non-Functional Properties (NFP)(such as performance, schedulability …
Towards automation of threat modeling based on a semantic model of attack patterns and weaknesses
A Brazhuk - arXiv preprint arXiv:2112.04231, 2021 - arxiv.org
This works considers challenges of building and usage a formal knowledge base (model),
which unites the ATT&CK, CAPEC, CWE, CVE security enumerations. The proposed model …
which unites the ATT&CK, CAPEC, CWE, CVE security enumerations. The proposed model …
Review of cybersecurity risk analysis methods and tools for safety critical industrial control systems
J Alanen, J Linnosmaa, J Pärssinen, A Kotelba… - 2022 - cris.vtt.fi
In this report, we have reviewed cybersecurity risk analysis methods and tools. A specific
focus is given to methods suitable for industrial control systems in the nuclear domain. For …
focus is given to methods suitable for industrial control systems in the nuclear domain. For …
A threat model and security recommendations for iot sensors in connected vehicle networks
SK Kuri, T Islam, J Jaskolka… - 2022 IEEE 95th Vehicular …, 2022 - ieeexplore.ieee.org
Intelligent transportation systems, such as connected vehicles, are able to establish real-
time, optimized and collision-free communication with the surrounding ecosystem …
time, optimized and collision-free communication with the surrounding ecosystem …
Multi-layered model-based design approach towards system safety and security co-engineering
The integration of safety and security concerns in critical domains (eg, Cyber-Physical
Systems (CPSs)) is of utmost importance, and should be conducted in early design phases …
Systems (CPSs)) is of utmost importance, and should be conducted in early design phases …
Constructing security cases based on formal verification of security requirements in alloy
Assuring that security requirements have been met in design phases is less expensive
compared with changes after system development. Security-critical systems deployment …
compared with changes after system development. Security-critical systems deployment …
A set of semantic data flow diagrams and its security analysis based on ontologies and knowledge graphs
A Brazhuk - arXiv preprint arXiv:2303.11198, 2023 - arxiv.org
For a long time threat modeling was treated as a manual, complicated process. However
modern agile development methodologies and cloud computing technologies require …
modern agile development methodologies and cloud computing technologies require …