2021 International Conference on Information Technology and Nanotechnology (ITNT) 2021
DOI: 10.1109/itnt52450.2021.9649191
|View full text |Cite
|
Sign up to set email alerts
|

Cybersecurity Risk Assessment Based on Cognitive Attack Vector Modeling with CVSS Score

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 15 publications
0
5
0
Order By: Relevance
“…Since we cannot determine the attack graph storage strategy and search strategy of refs. [35,36], we can not check their time/space consumption.…”
Section: Experiments Results Analysismentioning
confidence: 99%
See 2 more Smart Citations
“…Since we cannot determine the attack graph storage strategy and search strategy of refs. [35,36], we can not check their time/space consumption.…”
Section: Experiments Results Analysismentioning
confidence: 99%
“…Finally, in order to verify the accuracy of the collection results of key vulnerability nodes in the proposed method, this experiment compares the results of this paper with the search results of [35][36][37], respectively. The search results of key vulnerable nodes, the reachability of target nodes, and the changes in the number of attack paths after repairing the four methods are shown in Table 6.…”
Section: Experiments Results Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…On the other hand, Vasilyev et al [24] use CVSS metrics by putting the corresponding assets they have captured within a cyberattack vector model for speci ic systems. We note that they do not extract the score (via variables) as in our case, and they just simply use it.…”
Section: Network Mapping/scanning Methodologiesmentioning
confidence: 99%
“…Vasilyev et al, in [13] has proposed an automated modelling of a set of prospective incidents enables information extraction regarding infrastructure flaws, the most dangerous vulnerabilities, and potential flaws in system components. It also enables identification of the most effective attack scenarios and evaluation of the enterprise impact of those scenarios.…”
Section: Related Workmentioning
confidence: 99%