This work shows the viability of automatically generated attack graphs that are used for adversary behavior execution in industrial control system environments. This viability is evaluated and confirmed with expert interviews about results of this thesis, generated attack graphs and an implemented prototype.
☆12Jun 3, 2021Updated 4 years ago
Alternatives and similar repositories for AttackGraphGeneratorMasterThesis
Users that are interested in AttackGraphGeneratorMasterThesis are comparing it to the libraries listed below
Sorting:
- ☆14Jul 26, 2019Updated 6 years ago
- Deception and Moving Target Defense with Network Attack Simulation Paper Code☆14Dec 13, 2022Updated 3 years ago
- Apply Machine Learning and Game Theory to improve the security of the Turris network of CZ.NIC☆24Sep 24, 2019Updated 6 years ago
- Official repository for MalKG☆24Feb 12, 2021Updated 5 years ago
- [TDSC 2021] IntruSion alert-driven Attack Graph Extractor. https://ieeexplore.ieee.org/document/9557854☆40Jun 28, 2024Updated last year
- This repository hosts community contributed Kestrel analytics☆18May 28, 2024Updated last year
- A collection of awesome software, libraries, documents, books, resources and cool stuff about industrial control systems in cybersecurity…☆35Feb 9, 2025Updated last year
- ☆24Aug 15, 2020Updated 5 years ago
- This is a project source for NER in cybersecurity threat intelligence☆22Jul 4, 2022Updated 3 years ago
- ☆13Oct 27, 2022Updated 3 years ago
- 主要是自己看过的一些论文,同时做了对应的思维导图,以供大家参考学习。☆14May 15, 2022Updated 3 years ago
- ☆33Jan 28, 2021Updated 5 years ago
- [AAAI 2026] Official implementation of "Time Series Forecasting via Direct Per-Step Probability Distribution Modeling"☆33Dec 10, 2025Updated 3 months ago
- Paper list of federated learning: About system design☆13Apr 13, 2022Updated 3 years ago
- STIX 2.1 Visualizer, Attack and Activity Thread Graph for Threat Modeling☆33Dec 9, 2024Updated last year
- Python code to automatically produce a summary of a piece of text.☆12Sep 8, 2016Updated 9 years ago
- Correlate NVD datasets wIth CWE/CAPEC/CVSS labels for customised usage. Plus static analysis and data visualisation.☆13Nov 17, 2023Updated 2 years ago
- 2019 Fall - Game theory and Multi-agent RL Termproject☆10Dec 13, 2019Updated 6 years ago
- 用户埋点行为日志分析平台,项目主要用于搭建基于Flink、Apache Doris、Redis和MySQL等 中间件的用户行为日志收集、存储、分析平台,支持用户自定义查询条件☆12Dec 28, 2023Updated 2 years ago
- This project consists of advanced phishing detection using the BERT masked language model.☆28Jan 31, 2024Updated 2 years ago
- URL phishing detection using Generative Adversarial Network (GAN)☆16Oct 14, 2022Updated 3 years ago
- ☆16Apr 15, 2019Updated 6 years ago
- The original code for SCARA: Scalable Graph Neural Networks with Feature-Oriented Optimization (VLDB 2022) and Scalable Decoupling Graph …☆13Mar 8, 2024Updated 2 years ago
- Attack graph construction and analysis☆37May 18, 2019Updated 6 years ago
- Tool to visualize and explain LTL counterexamples generated by the NuSMV model checker☆10Sep 7, 2020Updated 5 years ago
- Minimal hitting set solver in Python☆11Dec 15, 2018Updated 7 years ago
- ☆12Aug 15, 2023Updated 2 years ago
- A P2P network security monitoring system for the Ethereum blockchain.☆15Aug 7, 2024Updated last year
- Small Python-based web application honeypot with built-in analysis tools.☆12Sep 15, 2019Updated 6 years ago
- Generate passwords and analyze their strength given physical limits to computation☆21Feb 25, 2023Updated 3 years ago
- A method for grouping, clustering, and merging semi-structured alerts☆24Nov 15, 2024Updated last year
- Bunch of honey related items that spoof/decoy powersploit functions.☆18Apr 23, 2020Updated 5 years ago
- This is the code repository for the paper "Zero-Sum Stochastic Stackelberg Games".☆16Oct 12, 2022Updated 3 years ago
- 哈工大毕业设计:面向网络靶场的自适应仿真流量生成技术☆15Jun 9, 2022Updated 3 years ago
- improve mulval to accommodate some updates and make it more suitable for industrial control network☆12Nov 22, 2022Updated 3 years ago
- A Red Team Script to Detect Canary Tokens and Seed Files☆15Jan 2, 2024Updated 2 years ago
- RASSH – Reinforced Adaptive SSH Honeypot This is a project developed for my Phd Thesis and the target is to create an Adaptive Honeypot…☆12Jul 29, 2019Updated 6 years ago
- Graph Representation of MITRE ATT&CK's CTI data☆51Nov 14, 2019Updated 6 years ago
- This is the official repository for "DiffSG: A Generative Solver for Network Optimization with Diffusion Model" and "Diffusion Models as …☆19Feb 10, 2025Updated last year