This MSc thesis will analyze how the Bayesian Theory can be applied to the Intrusion Prevention and Response Strategy research area. I am going to present a brief summary on the graphical security modelling technique, with the objective of describing a common point between the existing formalism and aiming to implement a Security Model Simulator that allows the expert to both run and compare different solutions and approaches to the same problem (or architecture). The focus of this work is on the simulator, presented in chapter 3, in particular on the technical details of the implementation and on the innate difficulties related to the lack of standard basic structure
It will effectively reduce the cost of development and maintenance in order to detect and predict se...
Security mechanisms are at the base of modern computer systems, demanded to be more and more reactiv...
In this paper, threat modeling issues in cyberphysical systems are discussed. First a generic model ...
Capturing the uncertain aspects in cyber security is important for security analysis in enterprise n...
To facilitate rational decision making regarding cyber security investments, decision makers need to...
This thesis presents a novel framework for security risk assessment (SRA) and identification, compri...
Bayesian Networks (BNs) are an increasingly popular modelling technique in cyber security especially...
| openaire: EC/H2020/740920/EU//CYBECO Funding Information: The research was partly developed in the...
This work concentrates on the cyber security of enterprise and Industrial Control Systems (ICS). Ent...
Probabilistic graphical models are one of the most important tools used to learnfrom data and make d...
Computer networks are becoming more complex as the reliance on these network increases in this era o...
Predictive analysis allows next-generation cyber defense that is more proactive than current approac...
Cybersecurity threats have surged in the past decades. Experts agree that conventional security meas...
The growing importance of the cyber domain to the military has created a need not only to train its ...
Ekelhart A, Kiesling E, Grill B, Strauss C, Stummer C. Integrating attacker behavior in IT security ...
It will effectively reduce the cost of development and maintenance in order to detect and predict se...
Security mechanisms are at the base of modern computer systems, demanded to be more and more reactiv...
In this paper, threat modeling issues in cyberphysical systems are discussed. First a generic model ...
Capturing the uncertain aspects in cyber security is important for security analysis in enterprise n...
To facilitate rational decision making regarding cyber security investments, decision makers need to...
This thesis presents a novel framework for security risk assessment (SRA) and identification, compri...
Bayesian Networks (BNs) are an increasingly popular modelling technique in cyber security especially...
| openaire: EC/H2020/740920/EU//CYBECO Funding Information: The research was partly developed in the...
This work concentrates on the cyber security of enterprise and Industrial Control Systems (ICS). Ent...
Probabilistic graphical models are one of the most important tools used to learnfrom data and make d...
Computer networks are becoming more complex as the reliance on these network increases in this era o...
Predictive analysis allows next-generation cyber defense that is more proactive than current approac...
Cybersecurity threats have surged in the past decades. Experts agree that conventional security meas...
The growing importance of the cyber domain to the military has created a need not only to train its ...
Ekelhart A, Kiesling E, Grill B, Strauss C, Stummer C. Integrating attacker behavior in IT security ...
It will effectively reduce the cost of development and maintenance in order to detect and predict se...
Security mechanisms are at the base of modern computer systems, demanded to be more and more reactiv...
In this paper, threat modeling issues in cyberphysical systems are discussed. First a generic model ...