Sign Up to like & get
recommendations!
1
Published in 2020 at "Data Mining and Knowledge Discovery"
DOI: 10.1007/s10618-020-00696-7
Abstract: Recent studies have shown that graph convolution networks (GCNs) are vulnerable to carefully designed attacks, which aim to cause misclassification of a specific node on the graph with unnoticeable perturbations. However, a vast majority of…
read more here.
Keywords:
attack;
injecting vicious;
attack graph;
scalable attack ... See more keywords
Sign Up to like & get
recommendations!
3
Published in 2023 at "IEEE Access"
DOI: 10.1109/access.2023.3272053
Abstract: Vulnerability assessment in industrial IoT networks is critical due to the evolving nature of the domain and the increasing complexity of security threats. This study aims to address the existing gaps in the literature by…
read more here.
Keywords:
iot;
vulnerability assessment;
attack graph;
attack ... See more keywords
Sign Up to like & get
recommendations!
2
Published in 2022 at "IEEE Transactions on Dependable and Secure Computing"
DOI: 10.1109/tdsc.2021.3117348
Abstract: Ideal cyber threat intelligence (CTI) includes insights into attacker strategies that are specific to a network under observation. Such CTI currently requires extensive expert input for obtaining, assessing, and correlating system vulnerabilities into a graphical…
read more here.
Keywords:
attack graph;
graph generation;
generation using;
driven attack ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2020 at "IEEE Transactions on Network and Service Management"
DOI: 10.1109/tnsm.2020.2987085
Abstract: Moving target defense (MTD) has emerged as a proactive defense mechanism aiming to thwart a potential attacker. The key underlying idea of MTD is to increase uncertainty and confusion for attackers by changing the attack…
read more here.
Keywords:
mtd;
attack graph;
attack;
defense ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2020 at "IEEE Transactions on Systems, Man, and Cybernetics: Systems"
DOI: 10.1109/tsmc.2019.2915940
Abstract: Securing cyber-physical systems (CPS) and Internet of Things (IoT) systems requires the identification of how interdependence among existing atomic vulnerabilities may be exploited by an adversary to stitch together an attack that can compromise the…
read more here.
Keywords:
attack graph;
attack;
scada networks;
computer ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2022 at "International Journal of Distributed Sensor Networks"
DOI: 10.1177/15501329221097817
Abstract: Device vulnerabilities emerge one after another in the Internet of thing environment, the attackers attack vulnerabilities on several low-level devices simultaneously by multi-step attack method to trigger the vulnerabilities on other high-level devices to damage…
read more here.
Keywords:
vulnerability;
attack graph;
device;
internet thing ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2023 at "Future Internet"
DOI: 10.3390/fi15040128
Abstract: For the current stage of complex and changing network environments and correlated and synchronized vulnerability attacks, this study first fuses attack graph technology and Bayesian networks and constructs Bayesian attack graphs toportray the correlation relationships…
read more here.
Keywords:
detection method;
attack graph;
bayesian attack;
network ... See more keywords