Enterprise architecture modeling for cybersecurity analysis in critical infrastructures-A systematic literature review

Y Jiang, MA Jeusfeld, M Mosaad, N Oo - International Journal of Critical …, 2024 - Elsevier
As digital landscapes become increasingly complex, safeguarding sensitive information and
systems against cyber threats has become a paramount concern for organizations. This …

[HTML][HTML] The meta attack language-a formal description

W Wideł, S Hacks, M Ekstedt, P Johnson… - Computers & …, 2023 - Elsevier
Nowadays, IT infrastructures are involved in making innumerable aspects of our lives
convenient, starting with water or energy distribution systems, and ending with e-commerce …

A model-driven formal methods approach to software architectural security vulnerabilities specification and verification

Q Rouland, B Hamid, J Jaskolka - Journal of Systems and Software, 2025 - Elsevier
Detecting and addressing security vulnerabilities in software designs is crucial for ensuring
the reliable and safe operation of systems. Existing approaches for vulnerability specification …

Towards a systematic method for developing meta attack language instances

S Hacks, S Katsikeas, E Rencelj Ling, W Xiong… - … Conference on Business …, 2022 - Springer
Successfully developing domain-specific languages (DSLs) demands language engineers
to consider their organizational context, which is challenging. Action design research (ADR) …

Towards automated attack simulations of BPMN-based processes

S Hacks, R Lagerström, D Ritter - 2021 IEEE 25th International …, 2021 - ieeexplore.ieee.org
Process digitization and integration is an increasing need for enterprises, while cyber-
attacks denote a growing threat. Using the Business Process Model and Notation (BPMN) is …

Towards automation of threat modeling based on a semantic model of attack patterns and weaknesses

A Brazhuk - arXiv preprint arXiv:2112.04231, 2021 - arxiv.org
This works considers challenges of building and usage a formal knowledge base (model),
which unites the ATT&CK, CAPEC, CWE, CVE security enumerations. The proposed model …

Cyber Security Assessment of An Interoperable Port Call and Voyage Optimization tool

S Hacks, J Pahl - Journal of Physics: Conference Series, 2024 - iopscience.iop.org
The MISSION project aims to revolutionize maritime transport by developing a digital tool for
real-time optimization of port calls and voyages, thereby reducing fuel consumption, cutting …

ASSA-CPS: Automated Formal Safety and Security Assessments in Cyber-Physical Systems

EY Kang - 2023 7th International Conference on System …, 2023 - ieeexplore.ieee.org
This paper describes dissemination and exploitation of the ASSA-CPS industrial research
project: Providing both safety and security assessments in emerging technologies, ie, Cyber …

Analyzing enterprise architecture models by means of the meta attack language

A Aldea, S Hacks - International Conference on Advanced Information …, 2022 - Springer
The digital transformation exposes organizations to new threats endangering their business.
A way to uncover these threats is threat modeling and attack simulations. However …

Towards model driven safety and security by design

M Campusano, S Hacks… - … to Software Quality …, 2022 - portal.findresearcher.sdu.dk
Software is getting more and more complex, while it gets more and more important to make it
safe and secure. At the sametime, the expectations towards the software developers …