Zobrazeno 1 - 10
of 4 077
pro vyhledávání: '"Attack Tree"'
Attack Trees are a graphical model of security used to study threat scenarios. While visually appealing and supported by solid theories and effective tools, one of their main drawbacks remains the amount of effort required by security experts to desi
Externí odkaz:
http://arxiv.org/abs/2402.12040
Attack trees are important for security, as they help to identify weaknesses and vulnerabilities in a system. Quantitative attack tree analysis supports a number security metrics, which formulate important KPIs such as the shortest, most likely and c
Externí odkaz:
http://arxiv.org/abs/2401.12346
Autor:
Yamaguchi, Yuki, Aoki, Toshiaki
Publikováno v:
28th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2023)
Recently, the evolution of deep learning has promoted the application of machine learning (ML) to various systems. However, there are ML systems, such as autonomous vehicles, that cause critical damage when they misclassify. Conversely, there are ML-
Externí odkaz:
http://arxiv.org/abs/2312.16957
Autor:
Khan, Ahmed Nawaz1 (AUTHOR) ac1126@coventry.ac.uk, Bryans, Jeremy1 (AUTHOR) ad4953@coventry.ac.uk, Sabaliauskaite, Giedre2 (AUTHOR) g.sabaliauskaite@swansea.ac.uk, Jadidbonab, Hesamaldin1 (AUTHOR)
Publikováno v:
Information (2078-2489). Dec2023, Vol. 14 Issue 12, p639. 27p.
Autor:
Pekaric, Irdin, Frick, Markus, Adigun, Jubril Gbolahan, Groner, Raffaela, Witte, Thomas, Raschke, Alexander, Felderer, Michael, Tichy, Matthias
Attack graphs are a tool for analyzing security vulnerabilities that capture different and prospective attacks on a system. As a threat modeling tool, it shows possible paths that an attacker can exploit to achieve a particular goal. However, due to
Externí odkaz:
http://arxiv.org/abs/2310.00654
Publikováno v:
IEEE Access, Vol 12, Pp 172610-172637 (2024)
The pervasive use of AI assistant systems and machine learning-based applications in various fields and everyday life has significantly shifted. However, this shift is not without its challenges. The emergence of security threats, various attacks, an
Externí odkaz:
https://doaj.org/article/6129a1a8442e43b39adc0c5662815699
Autor:
Wortman, P. A.1 (AUTHOR) paul.wortman@uconn.edu, Chandy, John1 (AUTHOR)
Publikováno v:
Information Security Journal: A Global Perspective. 2023, Vol. 32 Issue 4, p297-313. 17p.
Numerous analysis methods for quantitative attack tree analysis have been proposed. These algorithms compute relevant security metrics, i.e. performance indicators that quantify how good the security of a system is; typical metrics being the most lik
Externí odkaz:
http://arxiv.org/abs/2212.05358
As a result of the ever-increasing application of cyber-physical components in the automotive industry, cybersecurity has become an urgent topic. Adapting technologies and communication protocols like Ethernet and WiFi in connected vehicles yields ma
Externí odkaz:
http://arxiv.org/abs/2212.14435
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.