[HTML][HTML] Cyber risk and cybersecurity: a systematic review of data availability
Cybercrime is estimated to have cost the global economy just under USD 1 trillion in 2020,
indicating an increase of more than 50% since 2018. With the average cyber insurance …
indicating an increase of more than 50% since 2018. With the average cyber insurance …
A systematic review of cyber-resilience assessment frameworks
Cyber-attacks are regarded as one of the most serious threats to businesses worldwide.
Organizations dependent on Information Technology (IT) derive value not only from …
Organizations dependent on Information Technology (IT) derive value not only from …
[HTML][HTML] Machine learning cyberattack and defense strategies
JA Bland, MD Petty, TS Whitaker, KP Maxwell… - Computers & …, 2020 - Elsevier
Cybersecurity is an increasingly important challenge for computer systems. In this work,
cyberattacks were modeled using an extension of the well-known Petri net formalism. That …
cyberattacks were modeled using an extension of the well-known Petri net formalism. That …
Modeling cyberattacks with extended petri nets
A research program consisting of several interconnected research projects in cybersecurity
modeling is described. First, a public database of known cyberattack patterns is …
modeling is described. First, a public database of known cyberattack patterns is …
Cyber security threat analysis and attack simulation for unmanned aerial vehicle network
AY Javaid - 2015 - rave.ohiolink.edu
Use of unmanned systems in various tasks has increased exponentially in the recent past.
These systems enable users to complete vital missions efficiently, without risking human …
These systems enable users to complete vital missions efficiently, without risking human …
Single and multiple UAV cyber-attack simulation and performance evaluation
Usage of ground, air and underwater unmanned vehicles (UGV, UAV and UUV) has
increased exponentially in the recent past with industries producing thousands of these …
increased exponentially in the recent past with industries producing thousands of these …
Modeling cyberattacks with extended petri nets: Research program overview and status report
MD Petty, TS Whitaker, JA Bland… - Proceedings of the …, 2019 - search.proquest.com
A research program in cyberattack modeling consisting of four interconnected research
projects is described. First, a public database of known cyberattack patterns is automatically …
projects is described. First, a public database of known cyberattack patterns is automatically …
Simulating cyberattacks with extended Petri nets
MD Petty, JA Bland, TS Whitaker, WA Cantrell… - …, 2024 - journals.sagepub.com
Cybersecurity is an urgent concern. Cybersecurity simulation is an important part of the
response to it. This article describes a research program consisting of several …
response to it. This article describes a research program consisting of several …
Composition of Parent–Child cyberattack models
KP Maxwell, MD Petty, CD Colvett, TS Whitaker… - … 20, MSV'20, and GCC'20, 2021 - Springer
In today's world, every system developer and administrator should be familiar with
cyberattacks and possible threats to their organization systems. Petri nets have been used to …
cyberattacks and possible threats to their organization systems. Petri nets have been used to …
[图书][B] Verification and validation methods for extended petri nets modeling cyberattacks
WA Cantrell - 2021 - search.proquest.com
Verification and validation are crucial to establishing the credibility of the results of a
modeling and simulation project. Conclusions drawn from an unverified and unvalidated …
modeling and simulation project. Conclusions drawn from an unverified and unvalidated …