A survey on the usability and practical applications of graphical security models

JB Hong, DS Kim, CJ Chung, D Huang - Computer Science Review, 2017 - Elsevier
This paper presents and discusses the current state of Graphical Security Models (GrSM), in
terms of four GrSM phases:(i) generation,(ii) representation,(iii) evaluation, and (iv) …

Using Bayesian networks for cyber security analysis

P Xie, JH Li, X Ou, P Liu, R Levy - 2010 IEEE/IFIP International …, 2010 - ieeexplore.ieee.org
Capturing the uncertain aspects in cyber security is important for security analysis in
enterprise networks. However, there has been insufficient effort in studying what modeling …

Exploring attack graph for cost-benefit security hardening: A probabilistic approach

S Wang, Z Zhang, Y Kadobayashi - Computers & security, 2013 - Elsevier
The increasing complexity of today's computer systems, together with the rapid emergence
of novel vulnerabilities, make security hardening a formidable challenge for security …

A review of intelligent cybersecurity with Bayesian Networks

MJ Pappaterra, F Flammini - 2019 IEEE International …, 2019 - ieeexplore.ieee.org
Cybersecurity threats have surged in the past decades. Experts agree that conventional
security measures will soon not be enough to stop the propagation of more sophisticated …

Tasharok: Using mechanism design for enhancing security resource allocation in interdependent systems

M Abdallah, D Woods, P Naghizadeh… - … IEEE Symposium on …, 2022 - ieeexplore.ieee.org
We consider interdependent systems managed by multiple defenders that are under the
threat of stepping-stone attacks. We model such systems via game-theoretic models and …

A Bayesian framework for the analysis and optimal mitigation of cyber threats to cyber‐physical systems

P Żebrowski, A Couce‐Vieira, A Mancuso - Risk Analysis, 2022 - Wiley Online Library
Critical infrastructures are increasingly reliant on information and communications
technology (ICT) for more efficient operations, which, at the same time, exposes them to …

A model-based validated autonomic approach to self-protect computing systems

Q Chen, S Abdelwahed, A Erradi - IEEE Internet of things …, 2014 - ieeexplore.ieee.org
This paper introduces an autonomic model-based cyber security management approach for
the Internet of Things (IoT) ecosystems. The approach aims at realizing a self-protecting …

Prioritizing intrusion analysis using Dempster-Shafer theory

L Zomlot, SC Sundaramurthy, K Luo, X Ou… - Proceedings of the 4th …, 2011 - dl.acm.org
Intrusion analysis and incident management remains a difficult problem in practical network
security defense. The root cause of this problem is the large rate of false positives in the …

Network defense and behavioral biases: An experimental study

D Woods, M Abdallah, S Bagchi, S Sundaram… - Experimental …, 2022 - Springer
How do people distribute defenses over a directed network attack graph, where they must
defend a critical node? This question is of interest to computer scientists, information …

Morshed: Guiding behavioral decision-makers towards better security investment in interdependent systems

M Abdallah, D Woods, P Naghizadeh, I Khalil… - Proceedings of the …, 2021 - dl.acm.org
We model the behavioral biases of human decision-making in securing interdependent
systems and show that such behavioral decision-making leads to a suboptimal pattern of …