Mission-Centric Cyber Security Assessment of Critical Systems

[1]  William H. Sanders,et al.  RRE: A Game-Theoretic Intrusion Response and Recovery Engine , 2014, IEEE Transactions on Parallel and Distributed Systems.

[2]  Robert F. Mills,et al.  Improving the cyber incident mission impact assessment (CIMIA) process , 2008, CSIIRW '08.

[3]  Hasan Çam,et al.  Mission-aware time-dependent cyber asset criticality and resilience , 2013, CSIIRW '13.

[4]  Jeannette M. Wing,et al.  Tools for Generating and Analyzing Attack Graphs , 2003, FMCO.

[5]  Richard A. Raines,et al.  A framework for analyzing and mitigating the vulnerabilities of complex systems via attack and protection trees , 2007 .

[6]  Stefano Bistarelli,et al.  Defense trees for economic evaluation of security investments , 2006, First International Conference on Availability, Reliability and Security (ARES'06).

[7]  Zahid Anwar,et al.  Automatic security assessment of critical cyber-infrastructures , 2008, 2008 IEEE International Conference on Dependable Systems and Networks With FTCS and DCC (DSN).

[8]  Bryan Johnson,et al.  Analyzing Cyber Security Threats on Cyber-Physical Systems Using Model-Based Systems Engineering , 2015 .

[9]  Dong Seong Kim,et al.  Attack countermeasure trees (ACT): towards unifying the constructs of attack and defense trees , 2012, Secur. Commun. Networks.

[10]  Leo Katz,et al.  A new status index derived from sociometric analysis , 1953 .

[11]  Dmitry Podkuiko,et al.  Energy Theft in the Advanced Metering Infrastructure , 2009, CRITIS.

[12]  Sushil Jajodia,et al.  Cauldron mission-centric cyber situational awareness with defense in depth , 2011, 2011 - MILCOM 2011 Military Communications Conference.

[13]  Robin A. Gandhi,et al.  Semi-Automatic Annotation of Natural Language Vulnerability Reports , 2013, Int. J. Secur. Softw. Eng..

[14]  B. D'Ambrosio,et al.  Security Situation Assessment and Response Evaluation (SSARE) , 2001, Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01.

[15]  Ludovic Piètre-Cambacédès,et al.  Beyond Attack Trees: Dynamic Security Modeling with Boolean Logic Driven Markov Processes (BDMP) , 2010, 2010 European Dependable Computing Conference.

[16]  Mathias Ekstedt,et al.  The Cyber Security Modeling Language: A Tool for Assessing the Vulnerability of Enterprise System Architectures , 2013, IEEE Systems Journal.

[17]  Yalin E. Sagduyu,et al.  Integrated situational awareness for cyber attack detection, analysis, and mitigation , 2012, Defense + Commercial Sensing.

[18]  David L. Dill,et al.  Applying a Reusable Election Threat Model at the County Level , 2011, EVT/WOTE.

[19]  Mike Tanner,et al.  A systems engineering approach for crown jewels estimation and mission assurance decision making , 2011, 2011 IEEE Symposium on Computational Intelligence in Cyber Security (CICS).

[20]  William H. Sanders,et al.  Model-based Security Metrics Using ADversary VIew Security Evaluation (ADVISE) , 2011, 2011 Eighth International Conference on Quantitative Evaluation of SysTems.

[21]  Cynthia A. Phillips,et al.  A graph-based system for network-vulnerability analysis , 1998, NSPW '98.

[22]  Ketil Stølen,et al.  Model-based risk assessment to improve enterprise security , 2002, Proceedings. Sixth International Enterprise Distributed Object Computing.

[23]  William H. Sanders,et al.  Go with the flow: toward workflow-oriented security assessment , 2013, NSPW '13.

[24]  Dmitry Podkuiko,et al.  Multi-vendor penetration testing in the advanced metering infrastructure , 2010, ACSAC '10.

[25]  Ruth Breu,et al.  Quantitative Assessment of Enterprise Security System , 2008, 2008 Third International Conference on Availability, Reliability and Security.

[26]  John R. Goodall,et al.  Camus: Automatically mapping Cyber Assets to Missions and Users , 2009, MILCOM 2009 - 2009 IEEE Military Communications Conference.