Attack simulations provide a viable means to test the cyber security of a system. The simulations trace the steps taken by the attacker to compromise sensitive assets within the system. In addition to this, they can also estimate the time taken by the attacker for the same, measuring from the initial step up to the final. One common approach to implement such simulations is the use of attack graph, which trace the various dependencies of every step and their connection to one another in a formal way. To further facilitate attack simulations and to reduce the effort of creating new attack graphs for each system of a given type, domain-specific languages are employed. Another advantage of utilizing such a language is that they organize the co...
Today, many of our activities depend on the normal operation of the IT infrastructures that supports...
This project explores how a Meta Attack Language based Domain Specific Language for web applications...
Cloud computing is a fast-emerging technology. It is an attractive system for companies and has been...
Attack simulations provide a viable means to test the cyber security of a system. The simulations tr...
Cloud computing is becoming an increasingly popular computation model for IT-infrastructures which h...
Cyber-attack simulation is a suitable method used for assessing the security ofnetwork systems. An a...
This work concentrates on the cyber security of enterprise and Industrial Control Systems (ICS). Ent...
When assessing network systems, security has always been one of the priorities.Cyber threat modellin...
Cyber-attacks are an increasing problem for organizations across the world. The attacks on systems a...
This work is focused on investigating if the Meta Attack Language (MAL) can be used to create an int...
With the transition from traditional media and the increasing number of digital devices, the threats...
With the advent of the digital era there has been an exponential increase in complex cyber systems.A...
When more and more devices are getting connected to each other and to the internet, the security of ...
Cyber attacks on IT and OT systems can have severe consequences for individuals and organizations, f...
Today, many of our activities depend on the normal operation of the IT infrastructures that supports...
This project explores how a Meta Attack Language based Domain Specific Language for web applications...
Cloud computing is a fast-emerging technology. It is an attractive system for companies and has been...
Attack simulations provide a viable means to test the cyber security of a system. The simulations tr...
Cloud computing is becoming an increasingly popular computation model for IT-infrastructures which h...
Cyber-attack simulation is a suitable method used for assessing the security ofnetwork systems. An a...
This work concentrates on the cyber security of enterprise and Industrial Control Systems (ICS). Ent...
When assessing network systems, security has always been one of the priorities.Cyber threat modellin...
Cyber-attacks are an increasing problem for organizations across the world. The attacks on systems a...
This work is focused on investigating if the Meta Attack Language (MAL) can be used to create an int...
With the transition from traditional media and the increasing number of digital devices, the threats...
With the advent of the digital era there has been an exponential increase in complex cyber systems.A...
When more and more devices are getting connected to each other and to the internet, the security of ...
Cyber attacks on IT and OT systems can have severe consequences for individuals and organizations, f...
Today, many of our activities depend on the normal operation of the IT infrastructures that supports...
This project explores how a Meta Attack Language based Domain Specific Language for web applications...
Cloud computing is a fast-emerging technology. It is an attractive system for companies and has been...