[HTML][HTML] Threat modeling of industrial control systems: A systematic literature review

SM Khalil, H Bahsi, T Korõtko - Computers & Security, 2024 - Elsevier
Threat modeling is the process of identifying and mitigating potential threats to a system. It
was originally developed to enhance software security during the design phase but has …

Enhancing AMI network security with STI model: A mathematical perspective

O Kornyo, BT Partey, M Asante, K Owusu-Agyemang… - Internet of Things, 2024 - Elsevier
The popularity of cyberspace is skyrocketing as the need to make systems digital,
transparent, and fast is becoming indispensable, increasing the need for enhanced security …

A model-driven formal methods approach to software architectural security vulnerabilities specification and verification

Q Rouland, B Hamid, J Jaskolka - Journal of Systems and Software, 2025 - Elsevier
Detecting and addressing security vulnerabilities in software designs is crucial for ensuring
the reliable and safe operation of systems. Existing approaches for vulnerability specification …

Integrating the analysis of multiple non-functional properties in model-driven engineering

DC Petriu - Software and Systems Modeling, 2021 - Springer
This paper discusses the progress made so far and future challenges in integrating the
analysis of multiple Non-Functional Properties (NFP)(such as performance, schedulability …

Towards automation of threat modeling based on a semantic model of attack patterns and weaknesses

A Brazhuk - arXiv preprint arXiv:2112.04231, 2021 - arxiv.org
This works considers challenges of building and usage a formal knowledge base (model),
which unites the ATT&CK, CAPEC, CWE, CVE security enumerations. The proposed model …

Review of cybersecurity risk analysis methods and tools for safety critical industrial control systems

J Alanen, J Linnosmaa, J Pärssinen, A Kotelba… - 2022 - cris.vtt.fi
In this report, we have reviewed cybersecurity risk analysis methods and tools. A specific
focus is given to methods suitable for industrial control systems in the nuclear domain. For …

A threat model and security recommendations for iot sensors in connected vehicle networks

SK Kuri, T Islam, J Jaskolka… - 2022 IEEE 95th Vehicular …, 2022 - ieeexplore.ieee.org
Intelligent transportation systems, such as connected vehicles, are able to establish real-
time, optimized and collision-free communication with the surrounding ecosystem …

Multi-layered model-based design approach towards system safety and security co-engineering

M Quamara, G Pedroza, B Hamid - 2021 ACM/IEEE …, 2021 - ieeexplore.ieee.org
The integration of safety and security concerns in critical domains (eg, Cyber-Physical
Systems (CPSs)) is of utmost importance, and should be conducted in early design phases …

Constructing security cases based on formal verification of security requirements in alloy

M Zeroual, B Hamid, M Adedjouma… - … Conference on Computer …, 2023 - Springer
Assuring that security requirements have been met in design phases is less expensive
compared with changes after system development. Security-critical systems deployment …

A set of semantic data flow diagrams and its security analysis based on ontologies and knowledge graphs

A Brazhuk - arXiv preprint arXiv:2303.11198, 2023 - arxiv.org
For a long time threat modeling was treated as a manual, complicated process. However
modern agile development methodologies and cloud computing technologies require …