Enterprise architecture modeling for cybersecurity analysis in critical infrastructures-A systematic literature review
Y Jiang, MA Jeusfeld, M Mosaad, N Oo - International Journal of Critical …, 2024 - Elsevier
As digital landscapes become increasingly complex, safeguarding sensitive information and
systems against cyber threats has become a paramount concern for organizations. This …
systems against cyber threats has become a paramount concern for organizations. This …
[HTML][HTML] The meta attack language-a formal description
Nowadays, IT infrastructures are involved in making innumerable aspects of our lives
convenient, starting with water or energy distribution systems, and ending with e-commerce …
convenient, starting with water or energy distribution systems, and ending with e-commerce …
A model-driven formal methods approach to software architectural security vulnerabilities specification and verification
Detecting and addressing security vulnerabilities in software designs is crucial for ensuring
the reliable and safe operation of systems. Existing approaches for vulnerability specification …
the reliable and safe operation of systems. Existing approaches for vulnerability specification …
Towards a systematic method for developing meta attack language instances
Successfully developing domain-specific languages (DSLs) demands language engineers
to consider their organizational context, which is challenging. Action design research (ADR) …
to consider their organizational context, which is challenging. Action design research (ADR) …
Towards automated attack simulations of BPMN-based processes
Process digitization and integration is an increasing need for enterprises, while cyber-
attacks denote a growing threat. Using the Business Process Model and Notation (BPMN) is …
attacks denote a growing threat. Using the Business Process Model and Notation (BPMN) is …
Towards automation of threat modeling based on a semantic model of attack patterns and weaknesses
A Brazhuk - arXiv preprint arXiv:2112.04231, 2021 - arxiv.org
This works considers challenges of building and usage a formal knowledge base (model),
which unites the ATT&CK, CAPEC, CWE, CVE security enumerations. The proposed model …
which unites the ATT&CK, CAPEC, CWE, CVE security enumerations. The proposed model …
Cyber Security Assessment of An Interoperable Port Call and Voyage Optimization tool
The MISSION project aims to revolutionize maritime transport by developing a digital tool for
real-time optimization of port calls and voyages, thereby reducing fuel consumption, cutting …
real-time optimization of port calls and voyages, thereby reducing fuel consumption, cutting …
ASSA-CPS: Automated Formal Safety and Security Assessments in Cyber-Physical Systems
EY Kang - 2023 7th International Conference on System …, 2023 - ieeexplore.ieee.org
This paper describes dissemination and exploitation of the ASSA-CPS industrial research
project: Providing both safety and security assessments in emerging technologies, ie, Cyber …
project: Providing both safety and security assessments in emerging technologies, ie, Cyber …
Analyzing enterprise architecture models by means of the meta attack language
The digital transformation exposes organizations to new threats endangering their business.
A way to uncover these threats is threat modeling and attack simulations. However …
A way to uncover these threats is threat modeling and attack simulations. However …
Towards model driven safety and security by design
M Campusano, S Hacks… - … to Software Quality …, 2022 - portal.findresearcher.sdu.dk
Software is getting more and more complex, while it gets more and more important to make it
safe and secure. At the sametime, the expectations towards the software developers …
safe and secure. At the sametime, the expectations towards the software developers …