The scope of cyber security becomes wider and wider with time and cyber threats rapidly change. This strongly impacts the performance of companies whose success heavily depends on the health of the underlying network infrastructure. The ability to have a clear understanding of the security exposure of a network in its entirety hence becomes part of the mission of such companies. In this work we present the design and implementation of a distributed measurement solution to assess the cyber security exposure of an ICT Infrastructure. We provide means to define cyber security indicators through an automated and repeatable measurement process. We prove the efficiency of the presented methodology by testing it on real-world infrastructure facili...
Modern computer networks generate significant volume of behavioural system logs on a daily basis. Su...
With an increasing demand of inter-connectivity and protocol standardization modern cyber-critical i...
The deep integration between the cyber and physical domains in complex systems make very challenging...
AbstractModern computer networks generate significant volume of behavioural system logs on a daily b...
In recent years, critical infrastructures have become highly dependent on information and communicat...
Inherent vulnerabilities in software applications running in a computer network, bringing in persona...
Modern ICT ecosystems are complex, distributed infrastructures with multiple ingress and egress poin...
The dynamic and increasingly stealthy techniques used by cyber criminals to target critical computin...
Online automatic measurements are a way of doing cost effective environmental monitoring. The system...
Networks are increasingly subjected to threats that affect the reliability of critical infrastructur...
Model based security metrics are a growing area of cyber security research concerned with measuring ...
Complex networked systems have become an integral part of our supply infrastructure. Mobile devices,...
Cyber physical systems are becoming ubiquitous devices in many fields thus creating the need for eff...
An ongoing evolution of the power grids into more intelligent and sophisticated ones has been taking...
Increasingly mature, stealthy and dynamic techniques and attack vectors used by cyber criminals have...
Modern computer networks generate significant volume of behavioural system logs on a daily basis. Su...
With an increasing demand of inter-connectivity and protocol standardization modern cyber-critical i...
The deep integration between the cyber and physical domains in complex systems make very challenging...
AbstractModern computer networks generate significant volume of behavioural system logs on a daily b...
In recent years, critical infrastructures have become highly dependent on information and communicat...
Inherent vulnerabilities in software applications running in a computer network, bringing in persona...
Modern ICT ecosystems are complex, distributed infrastructures with multiple ingress and egress poin...
The dynamic and increasingly stealthy techniques used by cyber criminals to target critical computin...
Online automatic measurements are a way of doing cost effective environmental monitoring. The system...
Networks are increasingly subjected to threats that affect the reliability of critical infrastructur...
Model based security metrics are a growing area of cyber security research concerned with measuring ...
Complex networked systems have become an integral part of our supply infrastructure. Mobile devices,...
Cyber physical systems are becoming ubiquitous devices in many fields thus creating the need for eff...
An ongoing evolution of the power grids into more intelligent and sophisticated ones has been taking...
Increasingly mature, stealthy and dynamic techniques and attack vectors used by cyber criminals have...
Modern computer networks generate significant volume of behavioural system logs on a daily basis. Su...
With an increasing demand of inter-connectivity and protocol standardization modern cyber-critical i...
The deep integration between the cyber and physical domains in complex systems make very challenging...