Application of the armament cyber assessment framework: a security assessment methodology for military systems
Abstract
References
Index Terms
- Application of the armament cyber assessment framework: a security assessment methodology for military systems
Recommendations
Improving offensive cyber security assessments using varied and novel initialization perspectives
ACMSE '18: Proceedings of the ACMSE 2018 ConferenceOffensive cyber security assessment methods such as red teaming and penetration testing have grown in parallel with evolving threats to evaluate traditional and diverging attack surfaces. This paper provides a taxonomy of ethical hacker conducted ...
Cyber–physical risk assessment for false data injection attacks considering moving target defences: Best practice application of respective cyber and physical reinforcement assets to defend against FDI attacks
AbstractIn this paper, we examine the factors that influence the success of false data injection (FDI) attacks in the context of both cyber and physical styles of reinforcement. Existing research considers the FDI attack in the context of the ability to ...
A practical framework for cyber defense generation, enforcement and evaluation
AbstractIt is challenging to enforce and evaluate cyber-defenses for large networks. The current state-of-the-art approaches on defense enforcement and evaluations are manually performed by a security expert and they are executed separately ...
Highlights- A novel framework for automating the defense (blue) team operations.
- An ...
Comments
Information & Contributors
Information
Published In
- General Chair:
- Perry Alexander,
- Program Chairs:
- Drew Davidson,
- Baek-Young Choi
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Poster
Conference
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 89Total Downloads
- Downloads (Last 12 months)11
- Downloads (Last 6 weeks)2
Other Metrics
Citations
View Options
Get Access
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in