Dataset for the Publication of Architecture-based Attack Path Analysis for Identifying Potential Security Incidents. A description of the tooling can be found in our documentation
Threat modeling or architectural risk analysis (ARA) is a process to find cybersecurity threats in a...
Cyber security incidents have affected organisations from various industries. Malicious actors aim t...
This article presents a dataset produced to investigate how data and information quality estimations...
Dataset for the publication Architecture-based Attack Propagation and Variation Analysis for Identif...
Dataset for Paper "Tool-Supported Software Architecture-Based Data Flow Analysis for Confidentiality...
Dataset for our publication "Automatic Derivation of Vulnerability Models for Software Architectures
Abstract — Reviewing software system architecture to pinpoint potential security flaws before procee...
Please find the artifact repository online at the reference indicated below. The dataset is a colle...
This repository contains the dataset for my PhD thesis "Context-based Access Control and Attack Mode...
A collection of publicly disclosed security incidents involving Building Automation System (BAS) and...
Supplementary artifacts to "Architectural Security Weaknesses in Industrial Control Systems (ICS): A...
These files should be considered as additional material for the paper "Detecting Security Attacks in...
The different types of cyber-attacks on information and telecommunications systems are becoming incr...
In order to perform a useful threat analysis of a web application platform, some architectural assum...
Attack scenario graphs provide a concise way of displaying all possible sequences of attacks a malic...
Threat modeling or architectural risk analysis (ARA) is a process to find cybersecurity threats in a...
Cyber security incidents have affected organisations from various industries. Malicious actors aim t...
This article presents a dataset produced to investigate how data and information quality estimations...
Dataset for the publication Architecture-based Attack Propagation and Variation Analysis for Identif...
Dataset for Paper "Tool-Supported Software Architecture-Based Data Flow Analysis for Confidentiality...
Dataset for our publication "Automatic Derivation of Vulnerability Models for Software Architectures
Abstract — Reviewing software system architecture to pinpoint potential security flaws before procee...
Please find the artifact repository online at the reference indicated below. The dataset is a colle...
This repository contains the dataset for my PhD thesis "Context-based Access Control and Attack Mode...
A collection of publicly disclosed security incidents involving Building Automation System (BAS) and...
Supplementary artifacts to "Architectural Security Weaknesses in Industrial Control Systems (ICS): A...
These files should be considered as additional material for the paper "Detecting Security Attacks in...
The different types of cyber-attacks on information and telecommunications systems are becoming incr...
In order to perform a useful threat analysis of a web application platform, some architectural assum...
Attack scenario graphs provide a concise way of displaying all possible sequences of attacks a malic...
Threat modeling or architectural risk analysis (ARA) is a process to find cybersecurity threats in a...
Cyber security incidents have affected organisations from various industries. Malicious actors aim t...
This article presents a dataset produced to investigate how data and information quality estimations...