Computer networks and surging advancements of innovative information technology construct a critical infrastructure for network transactions of business entities. Information exchange and data access though such infrastructure is scrutinized by adversaries for vulnerabilities that lead to cyber-attacks. This paper presents an agent-based system modelling to conceptualize and extract explicit and latent structure of the complex enterprise systems as well as human interactions within the system to determine common vulnerabilities of the entity. The model captures emergent behavior resulting from interactions of multiple network agents including the number of workstations, regular, administrator and third-party users, external and internal att...
[[abstract]]In these years, rapid development of internet to help the enterprises make the informati...
The rapid development of computer technology, the emergence of modern cyber threats with signs of hy...
Identification of threats to organisations and risk assessment often take into consideration the pur...
2020 Innovations in Intelligent Systems and Applications Conference, ASYU 2020 -- 15 October 2020 th...
Threat assessment is the continuous process of monitoring the threats identified in the network of t...
Cyber-attacks have become inevitable in modern day society. Therefore, the occurrence of cyber-attac...
We propose a novel approach for statistical risk modeling of network attacks that lets an operator p...
Security remains a top priority for organizations as their information systems continue to be plague...
Computer networks are becoming more complex as the reliance on these network increases in this era o...
How do organizations rapidly assess command-level effects of cyber attacks? Leaders need a way of as...
The rapid development of computer technology, the emergence of modern cyber threats with signs of hy...
Software vulnerabilities are a major enabler for cyberattacks, and are therefore responsible for a s...
Being a relatively new risk source, models to quantify cyber risks are not well developed; therefore...
The cyber domain is a great business enabler providing many types of enterprises new opportunities s...
International audienceFor many years, the introduction of connected systems and digital technology i...
[[abstract]]In these years, rapid development of internet to help the enterprises make the informati...
The rapid development of computer technology, the emergence of modern cyber threats with signs of hy...
Identification of threats to organisations and risk assessment often take into consideration the pur...
2020 Innovations in Intelligent Systems and Applications Conference, ASYU 2020 -- 15 October 2020 th...
Threat assessment is the continuous process of monitoring the threats identified in the network of t...
Cyber-attacks have become inevitable in modern day society. Therefore, the occurrence of cyber-attac...
We propose a novel approach for statistical risk modeling of network attacks that lets an operator p...
Security remains a top priority for organizations as their information systems continue to be plague...
Computer networks are becoming more complex as the reliance on these network increases in this era o...
How do organizations rapidly assess command-level effects of cyber attacks? Leaders need a way of as...
The rapid development of computer technology, the emergence of modern cyber threats with signs of hy...
Software vulnerabilities are a major enabler for cyberattacks, and are therefore responsible for a s...
Being a relatively new risk source, models to quantify cyber risks are not well developed; therefore...
The cyber domain is a great business enabler providing many types of enterprises new opportunities s...
International audienceFor many years, the introduction of connected systems and digital technology i...
[[abstract]]In these years, rapid development of internet to help the enterprises make the informati...
The rapid development of computer technology, the emergence of modern cyber threats with signs of hy...
Identification of threats to organisations and risk assessment often take into consideration the pur...