The cyber security modeling language (CySeMoL) is a modeling language for enterprise-level system architectures coupled to a probabilistic inference engine. If the computer systems of an enterprise are modeled with CySeMoL, this inference engine can assess the probability that attacks on the systems will succeed. The theory used for the attack-probability calculations in CySeMoL is a compilation of research results on a number of security domains and covers a range of attacks and countermeasures. The theory has previously been validated on a component level. In this paper, the theory is also validated on a system level. A test indicates that the reasonableness and correctness of CySeMoL assessments compare with the reasonableness and correc...
International audienceFor many years, the introduction of connected systems and digital technology i...
This report describes a study aimed at uncovering flaws and finding potential improvements from when...
Ransomware has become one of the most catastrophic attacks in the previous decade, hurting businesse...
The cyber security modeling language (CySeMoL) is a modeling language for enterprise-level system ar...
Information technology (IT) is critical and valuable to our society. An important type of IT system ...
In this Master Thesis, several common applications used with MySQL and Linux server are modelled usi...
This report describes a study aimed at verifying a cyber security modeling language named the Predic...
This work concentrates on the cyber security of enterprise and Industrial Control Systems (ICS). Ent...
Cyber attacks on IT and OT systems can have severe consequences for individuals and organizations, f...
The paper presents the results of the development of a method for assessing the security of cyber-ph...
The paper presents the results of the development of a method for assessing the security of cyber-ph...
Development of Cybersecurity processes and strategies should take two main approaches. One is to dev...
All computer systems or systems of computers are composed of some combination of three basic compone...
Cyber-attack simulation is a suitable method used for assessing the security ofnetwork systems. An a...
Enterprise data systems are continuously growing in complexity and size. The attack area of these sy...
International audienceFor many years, the introduction of connected systems and digital technology i...
This report describes a study aimed at uncovering flaws and finding potential improvements from when...
Ransomware has become one of the most catastrophic attacks in the previous decade, hurting businesse...
The cyber security modeling language (CySeMoL) is a modeling language for enterprise-level system ar...
Information technology (IT) is critical and valuable to our society. An important type of IT system ...
In this Master Thesis, several common applications used with MySQL and Linux server are modelled usi...
This report describes a study aimed at verifying a cyber security modeling language named the Predic...
This work concentrates on the cyber security of enterprise and Industrial Control Systems (ICS). Ent...
Cyber attacks on IT and OT systems can have severe consequences for individuals and organizations, f...
The paper presents the results of the development of a method for assessing the security of cyber-ph...
The paper presents the results of the development of a method for assessing the security of cyber-ph...
Development of Cybersecurity processes and strategies should take two main approaches. One is to dev...
All computer systems or systems of computers are composed of some combination of three basic compone...
Cyber-attack simulation is a suitable method used for assessing the security ofnetwork systems. An a...
Enterprise data systems are continuously growing in complexity and size. The attack area of these sy...
International audienceFor many years, the introduction of connected systems and digital technology i...
This report describes a study aimed at uncovering flaws and finding potential improvements from when...
Ransomware has become one of the most catastrophic attacks in the previous decade, hurting businesse...