The coming era of alphahacking?: A survey of automatic software vulnerability detection, exploitation and patching techniques

T Ji, Y Wu, C Wang, X Zhang… - 2018 IEEE third …, 2018 - ieeexplore.ieee.org
With the success of the Cyber Grand Challenge (CGC) sponsored by DARPA, the topic of
Autonomous Cyber Reasoning System (CRS) has recently attracted extensive attention from …

Dynamic risk-aware patch scheduling

F Zhang, Q Li - 2020 IEEE Conference on Communications …, 2020 - ieeexplore.ieee.org
Every month, many new software vulnerabilities are discovered and published which will
pose security risks to power grid systems if they are exploited by attackers. Thus the …

PatchRank: Ordering updates for SCADA systems

G Yadav, K Paul - 2019 24th IEEE International Conference on …, 2019 - ieeexplore.ieee.org
Securing SCADA is a challenging task for the research community as well as the industry.
SCADA networks form the basis of industrial productivity. Industry 4.0 is likely to see more …

Improved software vulnerability patching techniques using CVSS and game theory

L Maghrabi, E Pfluegel, L Al-Fagih… - … on Cyber Security …, 2017 - ieeexplore.ieee.org
Software vulnerability patching is a crucial part of vulnerability management and is informed
by using effective vulnerability scoring techniques. The Common Vulnerability Scoring …

A Bayesian game theoretic approach for inspecting web-based malvertising

CT Huang, MN Sakib, CA Kamhoua… - … on Dependable and …, 2018 - ieeexplore.ieee.org
Web-based advertising systems have been exploited by cybercriminals to disseminate
malware to an enormous number of end-users and their vulnerable machines. To protect …

Risk mitigation in electric power systems: Where to start?

A Alshawish, H de Meer - Energy Informatics, 2019 - Springer
Power grids are becoming increasingly intelligent. In this regard, they benefit considerably
from the information technology (IT) networks coupled with their underlying operational …

Risk-Based Security Management in Critical Infrastructure Organizations

A Alshawish - 2021 - opus4.kobv.de
Critical infrastructure and contemporary business organizations are experiencing an
ongoing paradigm shift of business towards more collaboration and agility. On the one hand …

Risk-based decision-support for vulnerability remediation in electric power networks

A Alshawish, H de Meer - Proceedings of the Tenth ACM International …, 2019 - dl.acm.org
Power grids are becoming increasingly intelligent. However, the boundaries between their
operational technology (OT) environments and the (vulnerable) IT networks tend to dissolve …

A watermark inspection game for iot settings

G Gianini, C Mio, LG Fossi… - 2019 IEEE World …, 2019 - ieeexplore.ieee.org
Often the ownership of the information exchanged in IoT environments is protected by
watermarking. Violations are tracked by enforcing, at a cost, a watermarking verification …

An Assessment Model for Prioritizing CVEs in Critical Infrastructures in the Context of Time and Fault Criticality

E Koza - International Conference on Critical Information …, 2022 - Springer
Assessing vulnerabilities in operational technology (OT) and industrial control systems in a
multifaceted manner is challenging, particularly in the context of critical infrastructures. In …