V2TSA: Analysis of Vulnerability to Attack Techniques Using a Semantic Approach
In recent years, vulnerabilities in industrial control systems have increased substantially. The operational environment’s availability constraints hinder penetration testing from the attacker’s perspective as a viable vulnerability management method, thereby limiting the abili...
Saved in:
| Main Authors: | Do-Yeon Kim, Seong-Su Yoon, Ieck-Chae Euom |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
IEEE
2024-01-01
|
| Series: | IEEE Access |
| Subjects: | |
| Online Access: | https://ieeexplore.ieee.org/document/10749828/ |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Securing Maritime Autonomous Surface Ships: Cyber Threat Scenarios and Testbed Validation
by: Seongmin Lee, et al.
Published: (2025-01-01) -
Assessment of the Distributed Ledger Technology for Energy Sector Industrial and Operational Applications Using the MITRE ATT&CK® ICS Matrix
by: Annabelle Lee, et al.
Published: (2023-01-01) -
Enhancing cybersecurity resilience through advanced red-teaming exercises and MITRE ATT&CK framework integration: A paradigm shift in cybersecurity assessment
by: Semi Yulianto, et al.
Published: (2025-12-01) -
A Study on a Scenario-Based Security Incident Prediction System for Cybersecurity
by: Yong-Joon Lee
Published: (2024-12-01) -
Probabilistic models for evaluating network edge's resistance against scan and foothold attack
by: Shuo Wang, et al.
Published: (2024-12-01)