Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleSeptember 2024
A Red Team automated testing modeling and online planning method for post-penetration
Computers and Security (CSEC), Volume 144, Issue Chttps://doi.org/10.1016/j.cose.2024.103945AbstractPost-penetration red team automation testing effectively addresses the pain points of traditional manual red teams, including manpower, time costs, and the high level of professional knowledge required, thereby improving the efficiency and ...
- research-articleMarch 2024
Transient detection-based adaptive audio watermarking using attack-aware optimization
Digital Signal Processing (DISP), Volume 146, Issue Chttps://doi.org/10.1016/j.dsp.2023.104352AbstractThere has been a continued need for technology to prevent the illegal use of music in online transactions and protect the rights of copyright holders. Recently, the types of attacks have become very diverse due to various online environments and ...
- research-articleJuly 2023
The meta attack language - a formal description
Computers and Security (CSEC), Volume 130, Issue Chttps://doi.org/10.1016/j.cose.2023.103284AbstractNowadays, IT infrastructures are involved in making innumerable aspects of our lives convenient, starting with water or energy distribution systems, and ending with e-commerce solutions and online banking services. In the worst case, cyberattacks ...
- research-articleMarch 2023
Automated Security Assessments of Amazon Web Services Environments
ACM Transactions on Privacy and Security (TOPS), Volume 26, Issue 2Article No.: 20, Pages 1–31https://doi.org/10.1145/3570903Migrating enterprises and business capabilities to cloud platforms like Amazon Web Services (AWS) has become increasingly common. However, securing cloud operations, especially at large scales, can quickly become intractable. Customer-side issues such as ...
- research-articleAugust 2022
DoWTS – Denial-of-Wallet Test Simulator: Synthetic data generation for preemptive defence
Journal of Intelligent Information Systems (JIIS), Volume 60, Issue 2Pages 325–348https://doi.org/10.1007/s10844-022-00735-3AbstractThe intentional targeting of components in a cloud based application, in order to artificially inflate usage bills, is an issue application owners have faced for many years. This has occurred under many guises, such as: Economic Denial of ...
- research-articleMay 2022
Two decades of cyberattack simulations: A systematic literature review
Computers and Security (CSEC), Volume 116, Issue Chttps://doi.org/10.1016/j.cose.2022.102681AbstractCyberattack simulations appear across multiple computer security domains and are interpreted in many different but equally viable ways. However, this makes the topic appear fragmented and inconsistent, making it challenging to identify ...
- research-articleApril 2022
Automated benchmark network diversification for realistic attack simulation with application to moving target defense
International Journal of Information Security (IJOIS), Volume 21, Issue 2Pages 253–278https://doi.org/10.1007/s10207-021-00552-9AbstractWith numbers of exploitable vulnerabilities and attacks on networks constantly increasing, it is important to employ defensive techniques to protect one’s systems. A wide range of defenses are available and new paradigms such as Moving Target ...
- ArticleJune 2020
An Attack Simulation Language for the IT Domain
- Sotirios Katsikeas,
- Simon Hacks,
- Pontus Johnson,
- Mathias Ekstedt,
- Robert Lagerström,
- Joar Jacobsson,
- Max Wällstedt,
- Per Eliasson
Graphical Models for SecurityPages 67–86https://doi.org/10.1007/978-3-030-62230-5_4AbstractCyber-attacks on IT infrastructures can have disastrous consequences for individuals, regions, as well as whole nations. In order to respond to these threats, the cyber security assessment of IT infrastructures can foster a higher degree of ...