Essays about: "Graph-based Threat Models"

Found 2 essays containing the words Graph-based Threat Models.

  1. 1. Evaluating Security Mechanisms of Substation Automation Systems

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Ziyang Zhou; [2023]
    Keywords : Substation automation system; Threat modeling; Meta attack language; Stationsautomationssystem; Hotmodellering; Meta attack language;

    Abstract : Substations are important components for transforming voltage and distributing power in electrical infrastructure. Modern substations are usually automated by substation automation systems, which offload the work of operators and reduce potential human error. READ MORE

  2. 2. A Framework for Secure Structural Adaptation

    University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Author : Goran Saman Nariman; [2018]
    Keywords : Self-Adaptive System; Adaptive System; Security; Threat Models; Security Metrics; Structural Adaptation; Reconfiguration Plan; Security Level; Graph-based Threat Models; Dynamic Reconfiguration; Structural Reconfiguration; Attack Graphs; T-HARM; Attack Trees; Attack Graphs Generation; MulVAL;

    Abstract : A (self-) adaptive system is a system that can dynamically adapt its behavior or structure during execution to "adapt" to changes to its environment or the system itself. From a security standpoint, there has been some research pertaining to (self-) adaptive systems in general but not enough care has been shown towards the adaptation itself. READ MORE