Model-based quantitative network security metrics: A survey

A Ramos, M Lazar, R Holanda Filho… - … Surveys & Tutorials, 2017 - ieeexplore.ieee.org
Network security metrics (NSMs) based on models allow to quantitatively evaluate the
overall resilience of networked systems against attacks. For that reason, such metrics are of …

Embedded systems security: Threats, vulnerabilities, and attack taxonomy

D Papp, Z Ma, L Buttyan - … on Privacy, Security and Trust (PST), 2015 - ieeexplore.ieee.org
Embedded systems are the driving force for technological development in many domains
such as automotive, healthcare, and industrial control in the emerging post-PC era. As more …

[PDF][PDF] Analysis of security testing techniques

OB Tauqeer, S Jan, AO Khadidos… - … Automation & Soft …, 2021 - pdfs.semanticscholar.org
In the past decades, a significant increase has been observed in cyberattacks on the web-
based systems used for financial purposes. Such individual systems often contain security …

Network diversity: a security metric for evaluating the resilience of networks against zero-day attacks

M Zhang, L Wang, S Jajodia, A Singhal… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
Diversity has long been regarded as a security mechanism for improving the resilience of
software and networks against various attacks. More recently, diversity has found new …

k-zero day safety: A network security metric for measuring the risk of unknown vulnerabilities

L Wang, S Jajodia, A Singhal… - IEEE Transactions on …, 2013 - ieeexplore.ieee.org
By enabling a direct comparison of different security solutions with respect to their relative
effectiveness, a network security metric may provide quantifiable evidences to assist security …

Can the common vulnerability scoring system be trusted? a bayesian analysis

P Johnson, R Lagerström, M Ekstedt… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
The Common Vulnerability Scoring System (CVSS) is the state-of-the art system for
assessing software vulnerabilities. However, it has been criticized for lack of validity and …

[HTML][HTML] A system to calculate Cyber Value-at-Risk

A Erola, I Agrafiotis, JRC Nurse, L Axon… - Computers & …, 2022 - Elsevier
In the face of increasing numbers of cyber-attacks, it is critical for organisations to
understand the risk they are exposed to even after deploying security controls. This residual …

An AI-driven VM threat prediction model for multi-risks analysis-based cloud cybersecurity

D Saxena, I Gupta, R Gupta, AK Singh… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Cloud virtualization technology, ingrained with physical resource sharing, prompts
cybersecurity threats on users' virtual machines (VMs) due to the presence of inevitable …

Vulcon: A system for vulnerability prioritization, mitigation, and management

KA Farris, A Shah, G Cybenko, R Ganesan… - ACM Transactions on …, 2018 - dl.acm.org
Vulnerability remediation is a critical task in operational software and network security
management. In this article, an effective vulnerability management strategy, called VULCON …

PCySeMoL: Predictive, Probabilistic Cyber Security Modeling Language

H Holm, K Shahzad, M Buschle… - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
This paper presents the Predictive, Probabilistic Cyber Security Modeling Language (P 2
CySeMoL), an attack graph tool that can be used to estimate the cyber security of enterprise …