IT systems are indispensable nowadays. With thousands of hacking attempts happening daily, cyber defense mechanisms are crucial for maintaining a working state of those systems. Simulating an attacker is a means of preparing for future hacking attacks by determining the most likely vulnerabilities where an attack could be attempted. In previous work, the simulated attacker had full knowledge over the cyber system that is being compromised and could efficiently select a path that leads to valuable assets. However, a realistic attacker would only see a subset of the system. In this novel scenario, traditional path selection methods are not applicable anymore and the question arises: how well can a path selection policy be learned and correctl...
With the convergence of IT and OT networks, more opportunities can be found to destroy physical proc...
There are many machine learning techniques that cannot be performed on graph-data. Techniques such a...
IoT networks are the favorite target of cybercriminals. With more and more connected IoT devices, Io...
IT systems are indispensable nowadays. With thousands of hacking attempts happening daily, cyber def...
In recent years, the security of many corporate networks have been compromised by hackers who manage...
This paper presents an evolutionary approach for learning attack \ud specifications that describe at...
ICT systems are part of the vital infrastructure in today’s society. These systems are under constan...
Attack graphs are models that offer significant capabilities to analyse security in network systems....
This paper presents an evolutionary algorithm that learns attack scenarios, called attack specificat...
Network security analysis based on attack graphs has been applied extensively in recent years. The r...
In network security hardening a network administrator may need to use limited resources (such as hon...
The attack path is an effective tool for showing possible hacking routestaken by an attacker to targ...
Probabilistic graphical models are one of the most important tools used to learnfrom data and make d...
Network systems often contain vulnerabilities that remain unmitigated in a network for various reaso...
Computer networks are ubiquitous and growing exponentially, with a predicted 50 billion devices conn...
With the convergence of IT and OT networks, more opportunities can be found to destroy physical proc...
There are many machine learning techniques that cannot be performed on graph-data. Techniques such a...
IoT networks are the favorite target of cybercriminals. With more and more connected IoT devices, Io...
IT systems are indispensable nowadays. With thousands of hacking attempts happening daily, cyber def...
In recent years, the security of many corporate networks have been compromised by hackers who manage...
This paper presents an evolutionary approach for learning attack \ud specifications that describe at...
ICT systems are part of the vital infrastructure in today’s society. These systems are under constan...
Attack graphs are models that offer significant capabilities to analyse security in network systems....
This paper presents an evolutionary algorithm that learns attack scenarios, called attack specificat...
Network security analysis based on attack graphs has been applied extensively in recent years. The r...
In network security hardening a network administrator may need to use limited resources (such as hon...
The attack path is an effective tool for showing possible hacking routestaken by an attacker to targ...
Probabilistic graphical models are one of the most important tools used to learnfrom data and make d...
Network systems often contain vulnerabilities that remain unmitigated in a network for various reaso...
Computer networks are ubiquitous and growing exponentially, with a predicted 50 billion devices conn...
With the convergence of IT and OT networks, more opportunities can be found to destroy physical proc...
There are many machine learning techniques that cannot be performed on graph-data. Techniques such a...
IoT networks are the favorite target of cybercriminals. With more and more connected IoT devices, Io...