Ekelhart A, Kiesling E, Grill B, Strauss C, Stummer C. Integrating attacker behavior in IT security analysis: A discrete-event simulation approach. Information Technology and Management. 2015;16(3):221-233.When designing secure information systems, a profound understanding of the threats that they are exposed to is indispensable. Today's most severe risks come from malicious threat agents exploiting a variety of attack vectors to achieve their goals, rather than from random opportunistic threats such as malware. Most security analyses, however, focus on fixing technical weaknesses, but do not account for sophisticated combinations of attack mechanisms and heterogeneity in adversaries' motivations, resources, capabilities, or points of acces...
The increase of cyber-attacks raised security concerns for critical assets worldwide in the last dec...
This work concentrates on the cyber security of enterprise and Industrial Control Systems (ICS). Ent...
Central to computer security are detecting attacks against systems and managing computer systems to ...
AbstractThe number of connections between physical and cyber security systems is rapidly increasing ...
Information systems are pervasive in our everyday life. Anyone who is online must deal with the cons...
Computer networks are becoming more complex as the reliance on these network increases in this era o...
Kiesling E, Ekelhart A, Grill B, Stummer C, Strauss C. Evolving secure information systems through a...
This paper is based on a conceptual framework in which security can be split into two generic types ...
In this article, we present an experiment we conducted with discrete event simulations to analyze th...
Computer systems today are under constant attack by adversaries that are looking for opportunistic w...
Today, information systems are threatened not only by the opportunistic exploitation of particular t...
We introduce a new simulation platform called Insight, cre-ated to design and simulate cyber-attacks...
Abstract In intelligence analysis, data can be incomplete, ambiguous, and of large volume. Also, the...
Abstract: The approach to computer network security analysis intended for using both at design and e...
Nowadays, computer networks are used in many fields and their breakdown can strongly impact our dail...
The increase of cyber-attacks raised security concerns for critical assets worldwide in the last dec...
This work concentrates on the cyber security of enterprise and Industrial Control Systems (ICS). Ent...
Central to computer security are detecting attacks against systems and managing computer systems to ...
AbstractThe number of connections between physical and cyber security systems is rapidly increasing ...
Information systems are pervasive in our everyday life. Anyone who is online must deal with the cons...
Computer networks are becoming more complex as the reliance on these network increases in this era o...
Kiesling E, Ekelhart A, Grill B, Stummer C, Strauss C. Evolving secure information systems through a...
This paper is based on a conceptual framework in which security can be split into two generic types ...
In this article, we present an experiment we conducted with discrete event simulations to analyze th...
Computer systems today are under constant attack by adversaries that are looking for opportunistic w...
Today, information systems are threatened not only by the opportunistic exploitation of particular t...
We introduce a new simulation platform called Insight, cre-ated to design and simulate cyber-attacks...
Abstract In intelligence analysis, data can be incomplete, ambiguous, and of large volume. Also, the...
Abstract: The approach to computer network security analysis intended for using both at design and e...
Nowadays, computer networks are used in many fields and their breakdown can strongly impact our dail...
The increase of cyber-attacks raised security concerns for critical assets worldwide in the last dec...
This work concentrates on the cyber security of enterprise and Industrial Control Systems (ICS). Ent...
Central to computer security are detecting attacks against systems and managing computer systems to ...