MILCOM 2012 - 2012 IEEE Military Communications Conference 2012
DOI: 10.1109/milcom.2012.6415565
|View full text |Cite
|
Sign up to set email alerts
|

Evaluating network cyber resiliency methods using cyber threat, Vulnerability and Defense Modeling and Simulation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2014
2014
2024
2024

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 10 publications
(11 citation statements)
references
References 5 publications
0
9
0
Order By: Relevance
“…A basic military concept that has received extension theoretical review is maneuver [5], [11], [12]. Empowered by this theoretical search there has been limited work in actually building systems that exhibit the characteristics and behaviors of maneuver [13], [14], [15].…”
Section: A Military Maneuver and Cyberspacementioning
confidence: 99%
“…A basic military concept that has received extension theoretical review is maneuver [5], [11], [12]. Empowered by this theoretical search there has been limited work in actually building systems that exhibit the characteristics and behaviors of maneuver [13], [14], [15].…”
Section: A Military Maneuver and Cyberspacementioning
confidence: 99%
“…The concept of mind maps is leveraged by the AOH-Map [97] software, which visualizes all the identified traces of an attack to exchange it with collaborating analysts. Hassell et al [163] combine network simulation with its visualization for optimizing its resilience against threats. Payer et al [164] rely on Virtual Reality (VR) to analyze threats, allowing new types of interactions.…”
Section: ) Presentationmentioning
confidence: 99%
“…The cyber analysis modeling evaluation tool provides a simulation toolkit to evaluate the risk and enhance the resiliency of cyber attacks [14]. Executing cyber attacks and analyzing their effects in a large-scale real network environment requires much time and cost.…”
Section: Cyber Attack Modelingmentioning
confidence: 99%
“…Many studies have been conducted on cyber attack modeling such as attack graph approach, attack tree approach, cyber kill chain modeling approach, etc. [3][4][5][6][7][8][9][10][11][12][13][14]. Note that previous studies on cyber attack modeling has induced some issues such as scalability in a large-scale network system composed of tens of thousands of hosts, which make the prediction of possible attack paths and patterns be difficult.…”
Section: Introductionmentioning
confidence: 99%