A review of attack graph and attack tree visual syntax in cyber security

HS Lallie, K Debattista, J Bal - Computer Science Review, 2020 - Elsevier
Perceiving and understanding cyber-attacks can be a difficult task, and more effective
techniques are needed to aid cyber-attack perception. Attack modelling techniques (AMTs) …

A systematic review of cyber-resilience assessment frameworks

DAS Estay, R Sahay, MB Barfod, CD Jensen - Computers & security, 2020 - Elsevier
Cyber-attacks are regarded as one of the most serious threats to businesses worldwide.
Organizations dependent on Information Technology (IT) derive value not only from …

An empirical evaluation of the effectiveness of attack graphs and MITRE ATT&CK matrices in aiding cyber attack perception amongst decision-makers

AM Pirca, HS Lallie - Computers & Security, 2023 - Elsevier
Decision-makers struggle to understand cyber-security reports, sometimes leading to
inadequate cyber-attack responses. Attack modelling techniques (AMTs) can aid cyber …

A data mining framework to predict cyber attack for cyber security

MA Rahman, Y Al-Saggaf, T Zia - 2020 15th IEEE Conference …, 2020 - ieeexplore.ieee.org
Cyber-attacks are exponentially increasing daily with the advancements of technology.
Therefore, the detection and prediction of cyber-attacks are very important for every …

CyberSPL: a framework for the verification of cybersecurity policy compliance of system configurations using software product lines

ÁJ Varela-Vaca, R M. Gasca, R Ceballos… - Applied Sciences, 2019 - mdpi.com
Cybersecurity attacks affect the compliance of cybersecurity policies of the organisations.
Such disadvantages may be due to the absence of security configurations or the use of …

[PDF][PDF] Analysis of cyberattacks in public organizations in Latin America

SMT Toapanta, JDL Cobeña… - Adv. Sci. Technol …, 2020 - pdfs.semanticscholar.org
It was analyzed certain information about cyberattacks in Latin America and methods to
counteract the aggressions that affect services, data and infrastructure. The problem is the …

Cyber defence using attack graphs prediction and visualisation

S Mishra - International Journal of Communication …, 2023 - inderscienceonline.com
The use of the internet and other related technologies has increased dramatically in recent
years. Since sensitive and critical data is readily available on these systems, this information …

[PDF][PDF] A Dynamic Risk Assessment Method Based on Bayesian Attack Graph

Z Luo, R Xu, J Wang, W Zhu - Int. J. Netw. Secur, 2022 - ijns.jalaxy.com.tw
This paper proposes a network intrusion intention analysis method based on Bayesian
attack graphs, aiming to improve the incomplete atomic attack probability common in current …

Improving Attack Graph Visual Syntax Configurations.

A Sherzhanov, HF Atlam, MA Azad… - Electronics (2079 …, 2024 - search.ebscohost.com
As technology advances and cyber threats become increasingly sophisticated, the task of
recognising and understanding malicious activities becomes more complex. This persistent …

基于期望收益率攻击图的网络风险评估研究

刘文甫, 庞建民, 周鑫, 李男, 岳峰 - 网络与信息安全学报, 2022 - infocomm-journal.com
随着互联网应用和服务越来越广泛, 层出不穷的网络攻击活动导致信息系统的安全面临极大的
风险挑战. 攻击图作为基于模型的网络安全风险分析技术, 有助于发现网络节点间的脆弱性和 …