A survey on the usability and practical applications of graphical security models
This paper presents and discusses the current state of Graphical Security Models (GrSM), in
terms of four GrSM phases:(i) generation,(ii) representation,(iii) evaluation, and (iv) …
terms of four GrSM phases:(i) generation,(ii) representation,(iii) evaluation, and (iv) …
Using Bayesian networks for cyber security analysis
Capturing the uncertain aspects in cyber security is important for security analysis in
enterprise networks. However, there has been insufficient effort in studying what modeling …
enterprise networks. However, there has been insufficient effort in studying what modeling …
Exploring attack graph for cost-benefit security hardening: A probabilistic approach
S Wang, Z Zhang, Y Kadobayashi - Computers & security, 2013 - Elsevier
The increasing complexity of today's computer systems, together with the rapid emergence
of novel vulnerabilities, make security hardening a formidable challenge for security …
of novel vulnerabilities, make security hardening a formidable challenge for security …
A review of intelligent cybersecurity with Bayesian Networks
MJ Pappaterra, F Flammini - 2019 IEEE International …, 2019 - ieeexplore.ieee.org
Cybersecurity threats have surged in the past decades. Experts agree that conventional
security measures will soon not be enough to stop the propagation of more sophisticated …
security measures will soon not be enough to stop the propagation of more sophisticated …
Tasharok: Using mechanism design for enhancing security resource allocation in interdependent systems
We consider interdependent systems managed by multiple defenders that are under the
threat of stepping-stone attacks. We model such systems via game-theoretic models and …
threat of stepping-stone attacks. We model such systems via game-theoretic models and …
A Bayesian framework for the analysis and optimal mitigation of cyber threats to cyber‐physical systems
P Żebrowski, A Couce‐Vieira, A Mancuso - Risk Analysis, 2022 - Wiley Online Library
Critical infrastructures are increasingly reliant on information and communications
technology (ICT) for more efficient operations, which, at the same time, exposes them to …
technology (ICT) for more efficient operations, which, at the same time, exposes them to …
A model-based validated autonomic approach to self-protect computing systems
This paper introduces an autonomic model-based cyber security management approach for
the Internet of Things (IoT) ecosystems. The approach aims at realizing a self-protecting …
the Internet of Things (IoT) ecosystems. The approach aims at realizing a self-protecting …
Prioritizing intrusion analysis using Dempster-Shafer theory
Intrusion analysis and incident management remains a difficult problem in practical network
security defense. The root cause of this problem is the large rate of false positives in the …
security defense. The root cause of this problem is the large rate of false positives in the …
Network defense and behavioral biases: An experimental study
How do people distribute defenses over a directed network attack graph, where they must
defend a critical node? This question is of interest to computer scientists, information …
defend a critical node? This question is of interest to computer scientists, information …
Morshed: Guiding behavioral decision-makers towards better security investment in interdependent systems
We model the behavioral biases of human decision-making in securing interdependent
systems and show that such behavioral decision-making leads to a suboptimal pattern of …
systems and show that such behavioral decision-making leads to a suboptimal pattern of …