Zobrazeno 1 - 10
of 17
pro vyhledávání: '"Pekaric, Irdin"'
Many domains now leverage the benefits of Machine Learning (ML), which promises solutions that can autonomously learn to solve complex tasks by training over some data. Unfortunately, in cyberthreat detection, high-quality data is hard to come by. Mo
Externí odkaz:
http://arxiv.org/abs/2311.16388
Autor:
Pekaric, Irdin, Frick, Markus, Adigun, Jubril Gbolahan, Groner, Raffaela, Witte, Thomas, Raschke, Alexander, Felderer, Michael, Tichy, Matthias
Attack graphs are a tool for analyzing security vulnerabilities that capture different and prospective attacks on a system. As a threat modeling tool, it shows possible paths that an attacker can exploit to achieve a particular goal. However, due to
Externí odkaz:
http://arxiv.org/abs/2310.00654
Autor:
Groner, Raffaela, Witte, Thomas, Raschke, Alexander, Hirn, Sophie, Pekaric, Irdin, Frick, Markus, Tichy, Matthias, Felderer, Michael
Joint safety and security analysis of cyber-physical systems is a necessary step to correctly capture inter-dependencies between these properties. Attack-Fault Trees represent a combination of dynamic Fault Trees and Attack Trees and can be used to m
Externí odkaz:
http://arxiv.org/abs/2309.09941
Autor:
Witte, Thomas, Groner, Raffaela, Raschke, Alexander, Tichy, Matthias, Pekaric, Irdin, Felderer, Michael
Self-adaptive systems offer several attack surfaces due to the communication via different channels and the different sensors required to observe the environment. Often, attacks cause safety to be compromised as well, making it necessary to consider
Externí odkaz:
http://arxiv.org/abs/2309.09653
The openness of modern IT systems and their permanent change make it challenging to keep these systems secure. A combination of regression and security testing called security regression testing, which ensures that changes made to a system do not har
Externí odkaz:
http://arxiv.org/abs/2309.09647
Conducting safety simulations in various simulators, such as the Gazebo simulator, became a very popular means of testing vehicles against potential safety risks (i.e. crashes). However, this was not the case with security testing. Performing securit
Externí odkaz:
http://arxiv.org/abs/2309.09648
The identification of vulnerabilities is a continuous challenge in software projects. This is due to the evolution of methods that attackers employ as well as the constant updates to the software, which reveal additional issues. As a result, new and
Externí odkaz:
http://arxiv.org/abs/2309.09649
Autor:
Goupil, Francois, Laskov, Pavel, Pekaric, Irdin, Felderer, Michael, Dürr, Alexander, Thiesse, Frederic
Given the ongoing "arms race" in cybersecurity, the shortage of skilled professionals in this field is one of the strongest in computer science. The currently unmet staffing demand in cybersecurity is estimated at over 3 million jobs worldwide. Furth
Externí odkaz:
http://arxiv.org/abs/2204.13793
Autor:
Pekaric, Irdin, Groner, Raffaela, Witte, Thomas, Adigun, Jubril Gbolahan, Raschke, Alexander, Felderer, Michael, Tichy, Matthias
Publikováno v:
In The Journal of Systems & Software September 2023 203
Publikováno v:
In Computer Standards & Interfaces October 2021 78