ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Threat Modeling for Cyber Range: An Ontology-Based Approach
Lecture Notes in Electrical Engineering - Communications, Signal Processing, and Systems
◽
10.1007/978-981-13-6508-9_128
◽
2019
◽
pp. 1055-1062
◽
Cited By ~ 2
Author(s):
Lei Gong
◽
Yu Tian
Keyword(s):
Threat Modeling
◽
Cyber Range
Start Chat
Download Full-text
Related Documents
Cited By
References
Towards Comprehensive Threat Modeling for Intelligent Vehicle Cyber Security
CICTP 2017
◽
10.1061/9780784480915.453
◽
2018
◽
Author(s):
Haojie Ji
◽
Guizhen Yu
◽
Yunpeng Wang
◽
Zhao Zhang
◽
Hongmao Qin
Keyword(s):
Cyber Security
◽
Intelligent Vehicle
◽
Threat Modeling
Start Chat
Download Full-text
Model Based Verification of Cyber Range Event Environments
Modeling and Simulation of Complexity in Intelligent, Adaptive and Autonomous Systems 2016 (MSCIAAS 2016) and Space Simulation for Planetary Space Exploration (SPACE 2016)
◽
10.22360/springsim.2016.msciaasspace.009
◽
2016
◽
Keyword(s):
Model Based
◽
Cyber Range
Start Chat
Download Full-text
Asset-Oriented Threat Modeling
2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
◽
10.1109/trustcom50675.2020.00073
◽
2020
◽
Author(s):
Nan Messe
◽
Vanea Chiprianov
◽
Nicolas Belloir
◽
Jamal El-Hachem
◽
Regis Fleurquin
◽
...
Keyword(s):
Threat Modeling
Start Chat
Download Full-text
Security Threat Modeling
Proceedings of the IEEE/ACM 42nd International Conference on Software Engineering Workshops
◽
10.1145/3387940.3392221
◽
2020
◽
Cited By ~ 1
Author(s):
Laurens Sion
◽
Koen Yskout
◽
Dimitri Van Landuyt
◽
Alexander van den Berghe
◽
Wouter Joosen
Keyword(s):
Security Threat
◽
Threat Modeling
Start Chat
Download Full-text
Cyber threat modeling and validation
Proceedings of the 7th Symposium on Hot Topics in the Science of Security
◽
10.1145/3384217.3385626
◽
2020
◽
Author(s):
Eric D. Vugrin
◽
Jerry Cruz
◽
Christian Reedy
◽
Thomas Tarman
◽
Ali Pinar
Keyword(s):
Threat Modeling
◽
Cyber Threat
Start Chat
Download Full-text
On Threat Modeling and Mitigation of Medical Cyber-Physical Systems
2017 IEEE/ACM International Conference on Connected Health: Applications, Systems and Engineering Technologies (CHASE)
◽
10.1109/chase.2017.69
◽
2017
◽
Cited By ~ 8
Author(s):
Hussain Almohri
◽
Long Cheng
◽
Danfeng Yao
◽
Homa Alemzadeh
Keyword(s):
Cyber Physical Systems
◽
Threat Modeling
◽
Physical Systems
Start Chat
Download Full-text
POSTER: Construct macOS Cyber Range for Red/Blue Teams
Proceedings of the 15th ACM Asia Conference on Computer and Communications Security
◽
10.1145/3320269.3405449
◽
2020
◽
Author(s):
Yi-Hsien Chen
◽
Yen-Da Lin
◽
Chung-Kuan Chen
◽
Chin-Laung Lei
◽
Chun-Ying Huang
Keyword(s):
Cyber Range
Start Chat
Download Full-text
Threat Modeling and Security Issues for the Internet of Things
2019 Conference on Next Generation Computing Applications (NextComp)
◽
10.1109/nextcomp.2019.8883642
◽
2019
◽
Cited By ~ 1
Author(s):
Amar Seeam
◽
Ochanya S. Ogbeh
◽
Shivanand Guness
◽
Xavier Bellekens
Keyword(s):
Internet Of Things
◽
The Internet
◽
Threat Modeling
◽
Security Issues
◽
The Internet Of Things
Start Chat
Download Full-text
Toward Automated Threat Modeling of Edge Computing Systems
10.1109/csr51186.2021.9527937
◽
2021
◽
Author(s):
Valentina Casola
◽
Alessandra De Benedictis
◽
Carlo Mazzocca
◽
Rebecca Montanari
Keyword(s):
Edge Computing
◽
Computing Systems
◽
Threat Modeling
Start Chat
Download Full-text
Towards a Maritime Cyber Range training environment
10.1109/csr51186.2021.9527904
◽
2021
◽
Author(s):
Georgios Potamos
◽
Adamantini Peratikou
◽
Stavros Stavrou
Keyword(s):
Training Environment
◽
Cyber Range
Start Chat
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close