Model-based quantitative network security metrics: A survey
A Ramos, M Lazar, R Holanda Filho… - … Surveys & Tutorials, 2017 - ieeexplore.ieee.org
Network security metrics (NSMs) based on models allow to quantitatively evaluate the
overall resilience of networked systems against attacks. For that reason, such metrics are of …
overall resilience of networked systems against attacks. For that reason, such metrics are of …
Embedded systems security: Threats, vulnerabilities, and attack taxonomy
Embedded systems are the driving force for technological development in many domains
such as automotive, healthcare, and industrial control in the emerging post-PC era. As more …
such as automotive, healthcare, and industrial control in the emerging post-PC era. As more …
[PDF][PDF] Analysis of security testing techniques
OB Tauqeer, S Jan, AO Khadidos… - … Automation & Soft …, 2021 - pdfs.semanticscholar.org
In the past decades, a significant increase has been observed in cyberattacks on the web-
based systems used for financial purposes. Such individual systems often contain security …
based systems used for financial purposes. Such individual systems often contain security …
Network diversity: a security metric for evaluating the resilience of networks against zero-day attacks
Diversity has long been regarded as a security mechanism for improving the resilience of
software and networks against various attacks. More recently, diversity has found new …
software and networks against various attacks. More recently, diversity has found new …
k-zero day safety: A network security metric for measuring the risk of unknown vulnerabilities
By enabling a direct comparison of different security solutions with respect to their relative
effectiveness, a network security metric may provide quantifiable evidences to assist security …
effectiveness, a network security metric may provide quantifiable evidences to assist security …
Can the common vulnerability scoring system be trusted? a bayesian analysis
The Common Vulnerability Scoring System (CVSS) is the state-of-the art system for
assessing software vulnerabilities. However, it has been criticized for lack of validity and …
assessing software vulnerabilities. However, it has been criticized for lack of validity and …
[HTML][HTML] A system to calculate Cyber Value-at-Risk
In the face of increasing numbers of cyber-attacks, it is critical for organisations to
understand the risk they are exposed to even after deploying security controls. This residual …
understand the risk they are exposed to even after deploying security controls. This residual …
An AI-driven VM threat prediction model for multi-risks analysis-based cloud cybersecurity
Cloud virtualization technology, ingrained with physical resource sharing, prompts
cybersecurity threats on users' virtual machines (VMs) due to the presence of inevitable …
cybersecurity threats on users' virtual machines (VMs) due to the presence of inevitable …
Vulcon: A system for vulnerability prioritization, mitigation, and management
Vulnerability remediation is a critical task in operational software and network security
management. In this article, an effective vulnerability management strategy, called VULCON …
management. In this article, an effective vulnerability management strategy, called VULCON …
PCySeMoL: Predictive, Probabilistic Cyber Security Modeling Language
This paper presents the Predictive, Probabilistic Cyber Security Modeling Language (P 2
CySeMoL), an attack graph tool that can be used to estimate the cyber security of enterprise …
CySeMoL), an attack graph tool that can be used to estimate the cyber security of enterprise …