March 1, 2023, 2:10 a.m. | Alyzia-Maria Konsta, Beatrice Spiga, Alberto Lluch Lafuente, Nicola Dragoni

cs.CR updates on arXiv.org arxiv.org

Graphical security models constitute a well-known, user-friendly way to
represent the security of a system. These kinds of models are used by security
experts to identify vulnerabilities and assess the security of a system. The
manual construction of these models can be tedious, especially for large
enterprises. Consequently, the research community is trying to address this
issue by proposing methods for the automatic generation of such models. In this
work, we present a survey illustrating the current status of the …

address attack automatic community construction enterprises experts graphs identify issue large research security security experts security models survey system trees vulnerabilities well-known

Sr. Product Manager

@ MixMode | Remote, US

Information Security Engineers

@ D. E. Shaw Research | New York City

Technology Security Analyst

@ Halton Region | Oakville, Ontario, Canada

Senior Cyber Security Analyst

@ Valley Water | San Jose, CA

Vulnerability Research and Reverse Engineer (Onsite)

@ SNC-Lavalin | FL711: Raytheon SI Gov Dixie Hwy 3520 Dixie Highway NE , Palm Bay, FL, 32905 USA

Principal Consultant, Offensive Security

@ Kroll | CDMX, Mexico