[HTML][HTML] Cyber risk and cybersecurity: a systematic review of data availability

F Cremer, B Sheehan, M Fortmann, AN Kia… - The Geneva papers …, 2022 - ncbi.nlm.nih.gov
Cybercrime is estimated to have cost the global economy just under USD 1 trillion in 2020,
indicating an increase of more than 50% since 2018. With the average cyber insurance …

A systematic review of cyber-resilience assessment frameworks

DAS Estay, R Sahay, MB Barfod, CD Jensen - Computers & security, 2020 - Elsevier
Cyber-attacks are regarded as one of the most serious threats to businesses worldwide.
Organizations dependent on Information Technology (IT) derive value not only from …

[HTML][HTML] Machine learning cyberattack and defense strategies

JA Bland, MD Petty, TS Whitaker, KP Maxwell… - Computers & …, 2020 - Elsevier
Cybersecurity is an increasingly important challenge for computer systems. In this work,
cyberattacks were modeled using an extension of the well-known Petri net formalism. That …

Modeling cyberattacks with extended petri nets

MD Petty, TS Whitaker, EM Bearss, JA Bland… - Proceedings of the …, 2022 - dl.acm.org
A research program consisting of several interconnected research projects in cybersecurity
modeling is described. First, a public database of known cyberattack patterns is …

Cyber security threat analysis and attack simulation for unmanned aerial vehicle network

AY Javaid - 2015 - rave.ohiolink.edu
Use of unmanned systems in various tasks has increased exponentially in the recent past.
These systems enable users to complete vital missions efficiently, without risking human …

Single and multiple UAV cyber-attack simulation and performance evaluation

AY Javaid, W Sun, M Alam - EAI Endorsed Transactions on …, 2015 - publications.eai.eu
Usage of ground, air and underwater unmanned vehicles (UGV, UAV and UUV) has
increased exponentially in the recent past with industries producing thousands of these …

Modeling cyberattacks with extended petri nets: Research program overview and status report

MD Petty, TS Whitaker, JA Bland… - Proceedings of the …, 2019 - search.proquest.com
A research program in cyberattack modeling consisting of four interconnected research
projects is described. First, a public database of known cyberattack patterns is automatically …

Simulating cyberattacks with extended Petri nets

MD Petty, JA Bland, TS Whitaker, WA Cantrell… - …, 2024 - journals.sagepub.com
Cybersecurity is an urgent concern. Cybersecurity simulation is an important part of the
response to it. This article describes a research program consisting of several …

Composition of Parent–Child cyberattack models

KP Maxwell, MD Petty, CD Colvett, TS Whitaker… - … 20, MSV'20, and GCC'20, 2021 - Springer
In today's world, every system developer and administrator should be familiar with
cyberattacks and possible threats to their organization systems. Petri nets have been used to …

[图书][B] Verification and validation methods for extended petri nets modeling cyberattacks

WA Cantrell - 2021 - search.proquest.com
Verification and validation are crucial to establishing the credibility of the results of a
modeling and simulation project. Conclusions drawn from an unverified and unvalidated …