The growth of information and communication technology is constantly revolutionizing various domains, e.g., energy utility systems, healthcare, the internet of things, etc. This inception of widespread cyber technology enables reliability and first operability of the system, yet simultaneously imposed a risk of significant impact due to disruption of safe and secure operation. The attack surface is expanding, creating a cyber exposure gap which indicates a higher threat landscape and increased risk of compromise. Motivated by this increased threat exposure, this dissertation investigates the attack surface as a static and dynamic indicator of adversary propagation, seeking an efficient modeling paradigm to initiate threat-informed defense. ...
Threat Intelligence, both as a concept and a product, has been increasingly gaining prominence in th...
The high connectivity of modern cyber networks and devices has brought many improvements to the func...
Increased reliance on the Internet and other networked systems raise the risks of cyber attacks that...
The growth of information and communication technology is constantly revolutionizing various domains...
The growing dependency on interconnected devices makes cyber crime increasingly lucrative. Together ...
Computer networks are becoming more complex as the reliance on these network increases in this era o...
Organizations of every size and industry are facing a new normal. Adversaries have become more sophi...
Recent advancements in artificial intelligence (AI) technologies have induced tremendous growth in i...
a b s t r a c t In this paper, we investigate cyber-threats and the underlying infrastructures. More...
Risk assessment is a critical aspect of all businesses, and leaders are tasked with limiting risk to...
<p><strong>Objective:</strong> To determine the effects of an adversary’s behavior on the defender’s...
Contributions from the information fusion community have enabled comprehensible traces of intrusion ...
International audienceIdentifying patterns in the modus operandi of attackers is an essential requir...
Analyzing threats that have compromised electronic devices is important to compromised organizations...
Thesis: S.M. in Engineering and Management, Massachusetts Institute of Technology, School of Enginee...
Threat Intelligence, both as a concept and a product, has been increasingly gaining prominence in th...
The high connectivity of modern cyber networks and devices has brought many improvements to the func...
Increased reliance on the Internet and other networked systems raise the risks of cyber attacks that...
The growth of information and communication technology is constantly revolutionizing various domains...
The growing dependency on interconnected devices makes cyber crime increasingly lucrative. Together ...
Computer networks are becoming more complex as the reliance on these network increases in this era o...
Organizations of every size and industry are facing a new normal. Adversaries have become more sophi...
Recent advancements in artificial intelligence (AI) technologies have induced tremendous growth in i...
a b s t r a c t In this paper, we investigate cyber-threats and the underlying infrastructures. More...
Risk assessment is a critical aspect of all businesses, and leaders are tasked with limiting risk to...
<p><strong>Objective:</strong> To determine the effects of an adversary’s behavior on the defender’s...
Contributions from the information fusion community have enabled comprehensible traces of intrusion ...
International audienceIdentifying patterns in the modus operandi of attackers is an essential requir...
Analyzing threats that have compromised electronic devices is important to compromised organizations...
Thesis: S.M. in Engineering and Management, Massachusetts Institute of Technology, School of Enginee...
Threat Intelligence, both as a concept and a product, has been increasingly gaining prominence in th...
The high connectivity of modern cyber networks and devices has brought many improvements to the func...
Increased reliance on the Internet and other networked systems raise the risks of cyber attacks that...