Modern information society depends on reliable functionality of information systems infrastructure, while at the same time the number of cyber-attacks has been increasing over the years and damages have been caused. Furthermore, graphs can be used to show paths than can be exploited by attackers to intrude into systems and gain unauthorized access through vulnerability exploitation. This paper presents a method that builds attack graphs using data supplied from the maritime supply chain infrastructure. The method delivers all possible paths that can be exploited to gain access. Then, a recommendation system is utilized to make predictions about future attack steps within the network. We show that recommender systems can be used in cyber def...
Cyber Supply Chain (CSC) system is complex which involves different sub-systems performing various t...
Predictive analysis allows next-generation cyber defense that is more proactive than current approac...
Perceiving and understanding cyber-attacks can be a difficult task. This problem is widely recognise...
Modern information society depends on reliable functionality of information systems infrastructure, ...
Modern information society depends on reliable functionality of information systems infrastructure, ...
© Springer International Publishing AG 2017. Modern information society depends on reliable function...
Predictive analysis allows next-generation cyber defense that is more proactive than current approac...
Maritime port infrastructures rely on the use of information systems for collaboration, while a vita...
The ever-evolving capabilities of cyber attackers force security administrators to focus on the earl...
In the cyber domain, network defenders have traditionally been placed in a reactionary role. Before ...
This paper provides a survey of prediction, and forecasting methods used in cyber security. Four mai...
Predicting cyberattacks using machine learning has become imperative since cyberattacks have increas...
Due to the invincibility nature of cyber attacks on the cyber supply chain (CSC), and the cascading ...
This thesis research works on risk assessment of computer networks. Defining an attack model is norm...
Cyber Supply Chain(CSC) system is complex which involves different sub-systems performing various ta...
Cyber Supply Chain (CSC) system is complex which involves different sub-systems performing various t...
Predictive analysis allows next-generation cyber defense that is more proactive than current approac...
Perceiving and understanding cyber-attacks can be a difficult task. This problem is widely recognise...
Modern information society depends on reliable functionality of information systems infrastructure, ...
Modern information society depends on reliable functionality of information systems infrastructure, ...
© Springer International Publishing AG 2017. Modern information society depends on reliable function...
Predictive analysis allows next-generation cyber defense that is more proactive than current approac...
Maritime port infrastructures rely on the use of information systems for collaboration, while a vita...
The ever-evolving capabilities of cyber attackers force security administrators to focus on the earl...
In the cyber domain, network defenders have traditionally been placed in a reactionary role. Before ...
This paper provides a survey of prediction, and forecasting methods used in cyber security. Four mai...
Predicting cyberattacks using machine learning has become imperative since cyberattacks have increas...
Due to the invincibility nature of cyber attacks on the cyber supply chain (CSC), and the cascading ...
This thesis research works on risk assessment of computer networks. Defining an attack model is norm...
Cyber Supply Chain(CSC) system is complex which involves different sub-systems performing various ta...
Cyber Supply Chain (CSC) system is complex which involves different sub-systems performing various t...
Predictive analysis allows next-generation cyber defense that is more proactive than current approac...
Perceiving and understanding cyber-attacks can be a difficult task. This problem is widely recognise...