The coming era of alphahacking?: A survey of automatic software vulnerability detection, exploitation and patching techniques
T Ji, Y Wu, C Wang, X Zhang… - 2018 IEEE third …, 2018 - ieeexplore.ieee.org
With the success of the Cyber Grand Challenge (CGC) sponsored by DARPA, the topic of
Autonomous Cyber Reasoning System (CRS) has recently attracted extensive attention from …
Autonomous Cyber Reasoning System (CRS) has recently attracted extensive attention from …
Dynamic risk-aware patch scheduling
Every month, many new software vulnerabilities are discovered and published which will
pose security risks to power grid systems if they are exploited by attackers. Thus the …
pose security risks to power grid systems if they are exploited by attackers. Thus the …
PatchRank: Ordering updates for SCADA systems
Securing SCADA is a challenging task for the research community as well as the industry.
SCADA networks form the basis of industrial productivity. Industry 4.0 is likely to see more …
SCADA networks form the basis of industrial productivity. Industry 4.0 is likely to see more …
Improved software vulnerability patching techniques using CVSS and game theory
Software vulnerability patching is a crucial part of vulnerability management and is informed
by using effective vulnerability scoring techniques. The Common Vulnerability Scoring …
by using effective vulnerability scoring techniques. The Common Vulnerability Scoring …
A Bayesian game theoretic approach for inspecting web-based malvertising
Web-based advertising systems have been exploited by cybercriminals to disseminate
malware to an enormous number of end-users and their vulnerable machines. To protect …
malware to an enormous number of end-users and their vulnerable machines. To protect …
Risk mitigation in electric power systems: Where to start?
A Alshawish, H de Meer - Energy Informatics, 2019 - Springer
Power grids are becoming increasingly intelligent. In this regard, they benefit considerably
from the information technology (IT) networks coupled with their underlying operational …
from the information technology (IT) networks coupled with their underlying operational …
Risk-Based Security Management in Critical Infrastructure Organizations
A Alshawish - 2021 - opus4.kobv.de
Critical infrastructure and contemporary business organizations are experiencing an
ongoing paradigm shift of business towards more collaboration and agility. On the one hand …
ongoing paradigm shift of business towards more collaboration and agility. On the one hand …
Risk-based decision-support for vulnerability remediation in electric power networks
A Alshawish, H de Meer - Proceedings of the Tenth ACM International …, 2019 - dl.acm.org
Power grids are becoming increasingly intelligent. However, the boundaries between their
operational technology (OT) environments and the (vulnerable) IT networks tend to dissolve …
operational technology (OT) environments and the (vulnerable) IT networks tend to dissolve …
A watermark inspection game for iot settings
Often the ownership of the information exchanged in IoT environments is protected by
watermarking. Violations are tracked by enforcing, at a cost, a watermarking verification …
watermarking. Violations are tracked by enforcing, at a cost, a watermarking verification …
An Assessment Model for Prioritizing CVEs in Critical Infrastructures in the Context of Time and Fault Criticality
E Koza - International Conference on Critical Information …, 2022 - Springer
Assessing vulnerabilities in operational technology (OT) and industrial control systems in a
multifaceted manner is challenging, particularly in the context of critical infrastructures. In …
multifaceted manner is challenging, particularly in the context of critical infrastructures. In …