Inicio  /  Applied Sciences  /  Vol: 10 Par: 23 (2020)  /  Artículo
ARTÍCULO
TITULO

Method for Attack Tree Data Transformation and Import Into IT Risk Analysis Expert Systems

Donatas Vitkus    
Jonathan Salter    
Nikolaj Goranin and Dainius Ceponis    

Resumen

This paper proposes a novel approach of knowledge base formation for expert systems, dedicated to IT security risk analysis, using attack trees as a source of information. Automating the conversion of attack trees to a format that expert systems can use can be applied for minimizing time expenses while creating the knowledge base of an expert system and keeping it up to date, and for further applications as a risk assessment tool by small?medium enterprises.

 Artículos similares

       
 
María Elena Tejeda-del-Cueto, Manuel Alberto Flores-Alfaro, Miguel Toledo-Velázquez, Lorena del Carmen Santos-Cortes, José Hernández-Hernández and Marco Osvaldo Vigueras-Zúñiga    
The objective of this study is to develop a genetic algorithm that uses the IGP parameterization to increase the lift coefficient (CL) of three airfoils to be used on wings of unmanned aerial vehicles (UAVs). The geometry of three baseline airfoils was m... ver más
Revista: Aerospace

 
Mazen Gazzan and Frederick T. Sheldon    
Ransomware attacks have emerged as a significant threat to critical data and systems, extending beyond traditional computers to mobile and IoT/Cyber?Physical Systems. This study addresses the need to detect early ransomware behavior when only limited dat... ver más
Revista: Information

 
Junyao Zhang, Hao Zhan and Baigang Mi    
The submerged inlet exhibits good stealth characteristics and lower drag, but it has a low total pressure recovery coefficient and high distortion rate, which limits its widespread application. This paper proposes a vortex diverter aimed at enhancing the... ver más
Revista: Aerospace

 
Sharoug Alzaidy and Hamad Binsalleeh    
In the field of behavioral detection, deep learning has been extensively utilized. For example, deep learning models have been utilized to detect and classify malware. Deep learning, however, has vulnerabilities that can be exploited with crafted inputs,... ver más
Revista: Applied Sciences

 
Woonghee Lee, Mingeon Ju, Yura Sim, Young Kul Jung, Tae Hyung Kim and Younghoon Kim    
Deep learning-based segmentation models have made a profound impact on medical procedures, with U-Net based computed tomography (CT) segmentation models exhibiting remarkable performance. Yet, even with these advances, these models are found to be vulner... ver más
Revista: Applied Sciences