A review of attack graph and attack tree visual syntax in cyber security
Perceiving and understanding cyber-attacks can be a difficult task, and more effective
techniques are needed to aid cyber-attack perception. Attack modelling techniques (AMTs) …
techniques are needed to aid cyber-attack perception. Attack modelling techniques (AMTs) …
A systematic review of cyber-resilience assessment frameworks
Cyber-attacks are regarded as one of the most serious threats to businesses worldwide.
Organizations dependent on Information Technology (IT) derive value not only from …
Organizations dependent on Information Technology (IT) derive value not only from …
An empirical evaluation of the effectiveness of attack graphs and MITRE ATT&CK matrices in aiding cyber attack perception amongst decision-makers
AM Pirca, HS Lallie - Computers & Security, 2023 - Elsevier
Decision-makers struggle to understand cyber-security reports, sometimes leading to
inadequate cyber-attack responses. Attack modelling techniques (AMTs) can aid cyber …
inadequate cyber-attack responses. Attack modelling techniques (AMTs) can aid cyber …
A data mining framework to predict cyber attack for cyber security
Cyber-attacks are exponentially increasing daily with the advancements of technology.
Therefore, the detection and prediction of cyber-attacks are very important for every …
Therefore, the detection and prediction of cyber-attacks are very important for every …
CyberSPL: a framework for the verification of cybersecurity policy compliance of system configurations using software product lines
Cybersecurity attacks affect the compliance of cybersecurity policies of the organisations.
Such disadvantages may be due to the absence of security configurations or the use of …
Such disadvantages may be due to the absence of security configurations or the use of …
[PDF][PDF] Analysis of cyberattacks in public organizations in Latin America
SMT Toapanta, JDL Cobeña… - Adv. Sci. Technol …, 2020 - pdfs.semanticscholar.org
It was analyzed certain information about cyberattacks in Latin America and methods to
counteract the aggressions that affect services, data and infrastructure. The problem is the …
counteract the aggressions that affect services, data and infrastructure. The problem is the …
Cyber defence using attack graphs prediction and visualisation
S Mishra - International Journal of Communication …, 2023 - inderscienceonline.com
The use of the internet and other related technologies has increased dramatically in recent
years. Since sensitive and critical data is readily available on these systems, this information …
years. Since sensitive and critical data is readily available on these systems, this information …
[PDF][PDF] A Dynamic Risk Assessment Method Based on Bayesian Attack Graph
Z Luo, R Xu, J Wang, W Zhu - Int. J. Netw. Secur, 2022 - ijns.jalaxy.com.tw
This paper proposes a network intrusion intention analysis method based on Bayesian
attack graphs, aiming to improve the incomplete atomic attack probability common in current …
attack graphs, aiming to improve the incomplete atomic attack probability common in current …
Improving Attack Graph Visual Syntax Configurations.
As technology advances and cyber threats become increasingly sophisticated, the task of
recognising and understanding malicious activities becomes more complex. This persistent …
recognising and understanding malicious activities becomes more complex. This persistent …
基于期望收益率攻击图的网络风险评估研究
刘文甫, 庞建民, 周鑫, 李男, 岳峰 - 网络与信息安全学报, 2022 - infocomm-journal.com
随着互联网应用和服务越来越广泛, 层出不穷的网络攻击活动导致信息系统的安全面临极大的
风险挑战. 攻击图作为基于模型的网络安全风险分析技术, 有助于发现网络节点间的脆弱性和 …
风险挑战. 攻击图作为基于模型的网络安全风险分析技术, 有助于发现网络节点间的脆弱性和 …