This report describes a study aimed at verifying a cyber security modeling language named the Predictive, Probabilistic Cyber Security Modelling Language. This modeling language together with the Enterprise Architecture Analysis Tool acts as a tool for cyber security evaluations of system architectures. To verify the accuracy and readiness of the tool, a generic model of a real life Supervisory Control And Data Acquisition System’s system architecture was modeled using the tool and later evaluated. The evaluation process consisted of a Turing test, which was the same method used for evaluation of the Predictive, Probabilistic Cyber Security Modelling Language predecessor the Cyber Security Modelling Language. For the Turing test, interviews...
As businesses use more digital services connected to the internet, these services and systems become...
Cyber-attack simulation is a suitable method used for assessing the security ofnetwork systems. An a...
As cyber threats continue to grow and expertise resources are limited, organisationsneed to find way...
Information technology (IT) is critical and valuable to our society. An important type of IT system ...
The cyber security modeling language (CySeMoL) is a modeling language for enterprise-level system ar...
Cyberattacks are becoming a greater concern as our society is digitized to a greater extent, with th...
Companies and organizations seek to comply to various cybersecurity standards in order to improve th...
Information Technology (IT) is a cornerstone of our modern society and essential for governments' ma...
Probabilistic graphical models are one of the most important tools used to learnfrom data and make d...
Information technology (IT) systems are growing in complexity and are becoming more and more connect...
Enterprise data systems are continuously growing in complexity and size. The attack area of these sy...
With the transition from traditional media and the increasing number of digital devices, the threats...
Background - Foreseeing, mitigating and preventing cyber-attacks is more important than ever before....
Threat modelling of systems is an emerging field within computer security. With the introduction of ...
It is well-established that machine learning techniques have been used with great success in other d...
As businesses use more digital services connected to the internet, these services and systems become...
Cyber-attack simulation is a suitable method used for assessing the security ofnetwork systems. An a...
As cyber threats continue to grow and expertise resources are limited, organisationsneed to find way...
Information technology (IT) is critical and valuable to our society. An important type of IT system ...
The cyber security modeling language (CySeMoL) is a modeling language for enterprise-level system ar...
Cyberattacks are becoming a greater concern as our society is digitized to a greater extent, with th...
Companies and organizations seek to comply to various cybersecurity standards in order to improve th...
Information Technology (IT) is a cornerstone of our modern society and essential for governments' ma...
Probabilistic graphical models are one of the most important tools used to learnfrom data and make d...
Information technology (IT) systems are growing in complexity and are becoming more and more connect...
Enterprise data systems are continuously growing in complexity and size. The attack area of these sy...
With the transition from traditional media and the increasing number of digital devices, the threats...
Background - Foreseeing, mitigating and preventing cyber-attacks is more important than ever before....
Threat modelling of systems is an emerging field within computer security. With the introduction of ...
It is well-established that machine learning techniques have been used with great success in other d...
As businesses use more digital services connected to the internet, these services and systems become...
Cyber-attack simulation is a suitable method used for assessing the security ofnetwork systems. An a...
As cyber threats continue to grow and expertise resources are limited, organisationsneed to find way...