All computer systems or systems of computers are composed of some combination of three basic components; hardware, firmware, and software. These systems are assessed to determine our confidence in their level of robustness, where robustness is the characterization of strength of a security function, mechanism, service, or solution, and the assurance that it is implemented and functioning correctly. Most experienced assessors are aware that the level of robustness required for each system is dependent upon dynamic factors such as operational environment, threat source interest, and mission criticality. This dissertation provides a methodology and mathematical models to assess systems. The models, and the results they yield, provide an eq...
The cyber security modeling language (CySeMoL) is a modeling language for enterprise-level system ar...
The deep integration between the cyber and physical domains in complex systems make very challenging...
The terrorist attacks of September 11, 2001 brought to light threats and vulnerabilities that face t...
Information system security is the integrity and safety of its resources and activities. In the cybe...
The development of the IT industry and computing resources allows the formation of cyberphysical soc...
Proceedings of the 39th Hawaii International Conference on System Sciences- 2006potential attacks if...
The paper presents the results of the development of a method for assessing the security of cyber-ph...
The paper presents the results of the development of a method for assessing the security of cyber-ph...
Today, computer systems are more and more complex and support growing security risks. The security m...
When attacking a software system is only as difficult as it is to obtain a vulnerability to exploit,...
Ransomware has become one of the most catastrophic attacks in the previous decade, hurting businesse...
Formal evaluation of systems Trust based on assurance evidence { basis for condence { not perfect s...
This paper presents the conceptual basis for and a simple example of quantitative assessment of the ...
This electronic version was submitted by the student author. The certified thesis is available in th...
Information systems are pervasive in our everyday life. Anyone who is online must deal with the cons...
The cyber security modeling language (CySeMoL) is a modeling language for enterprise-level system ar...
The deep integration between the cyber and physical domains in complex systems make very challenging...
The terrorist attacks of September 11, 2001 brought to light threats and vulnerabilities that face t...
Information system security is the integrity and safety of its resources and activities. In the cybe...
The development of the IT industry and computing resources allows the formation of cyberphysical soc...
Proceedings of the 39th Hawaii International Conference on System Sciences- 2006potential attacks if...
The paper presents the results of the development of a method for assessing the security of cyber-ph...
The paper presents the results of the development of a method for assessing the security of cyber-ph...
Today, computer systems are more and more complex and support growing security risks. The security m...
When attacking a software system is only as difficult as it is to obtain a vulnerability to exploit,...
Ransomware has become one of the most catastrophic attacks in the previous decade, hurting businesse...
Formal evaluation of systems Trust based on assurance evidence { basis for condence { not perfect s...
This paper presents the conceptual basis for and a simple example of quantitative assessment of the ...
This electronic version was submitted by the student author. The certified thesis is available in th...
Information systems are pervasive in our everyday life. Anyone who is online must deal with the cons...
The cyber security modeling language (CySeMoL) is a modeling language for enterprise-level system ar...
The deep integration between the cyber and physical domains in complex systems make very challenging...
The terrorist attacks of September 11, 2001 brought to light threats and vulnerabilities that face t...