REFERENCES
Cichonski, P., Millar, T., Grance, T., and Scarfone, K.
(2012). NIST Special Publication 800-61 : Computer
Security Incident Handling Guide. https://doi.org/10.
6028/NIST.SP.800-61r2.
Ekstedt, M., Johnson, P., Lagerstr
¨
om, R., Gorton, D.,
Nydr
´
en, J., and Shahzad, K. (2015). Securi cad by
foreseeti: A cad tool for enterprise cyber security
management. In 2015 IEEE 19th International Enter-
prise Distributed Object Computing Workshop, pages
152–155.
Fahlander, P. (2021). Containment strategy formalism in
a probabilistic threat modelling framework. Master’s
thesis.
Fila, B. and Wideł, W. (2020). Exploiting attack-defense
trees to find an optimal set of countermeasures. In
33rd IEEE Computer Security Foundations Sympo-
sium, CSF 2020, Boston, MA, USA, June 22-26, 2020,
pages 395–410. IEEE.
Hacks, S., Katsikeas, S., Ling, E., Lagerstr
¨
om, R., and Ek-
stedt, M. (2020). powerlang: a probabilistic attack
simulation language for the power domain. Energy
Informatics, 3(1).
Johansen, G. (2020). Digital forensics and incident re-
sponse : incident response techniques and procedures
to respond to modern cyber threats, pages 46–49. Sec-
ond edition.. edition.
Johnson, P., Lagerstr
¨
om, R., and Ekstedt, M. (2018). A
meta language for threat modeling and attack simu-
lations. In Doerr, S., Fischer, M., Schrittwieser, S.,
and Herrmann, D., editors, Proceedings of the 13th In-
ternational Conference on Availability, Reliability and
Security, ARES 2018, Hamburg, Germany, August 27-
30, 2018, pages 38:1–38:8. ACM.
Katsikeas, S., Hacks, S., Johnson, P., Ekstedt, M., Lager-
str
¨
om, R., Jacobsson, J., W
¨
allstedt, M., and Eliasson,
P. (2020). An Attack Simulation Language for the
IT Domain. In Eades III, H. and Gadyatskaya, O.,
editors, Graphical Models for Security, pages 67–86,
Cham. Springer International Publishing.
Katsikeas, S., Johnson, P., Hacks, S., and Lagerstr
¨
om, R.
(2019). Probabilistic modeling and simulation of ve-
hicular cyber attacks: An application of the meta at-
tack language. In Proceedings of the 5th international
conference on information systems security and pri-
vacy (ICISSP), page 175.
Leemon@cs. cmu. edu, L. B. (2021). What is Simulated
Annealing? http://www.cs.cmu.edu/afs/cs.cmu.edu/
project/learn-43/lib/photoz/.g/web/glossary/anneal.
html. [Online; accessed 28. Aug. 2021].
Li, F., Li, Y., Leng, S., Guo, Y., Geng, K., Wang, Z., and
Fang, L. (2020). Dynamic countermeasures selec-
tion for multi-path attacks. Computers & Security,
97:101927.
mal lang (2021). coreLang. https://github.com/mal-lang/
coreLang. [Online; accessed 22. Aug. 2021].
McQueen, M. A., Boyer, W. F., Flynn, M. A., and Beitel,
G. A. (2006). Time-to-compromise model for cyber
risk reduction estimation. In Gollmann, D., Massacci,
F., and Yautsiukhin, A., editors, Quality of Protection,
pages 49–64, Boston, MA. Springer US.
Poolsappasit, N., Dewri, R., and Ray, I. (2012). Dy-
namic security risk management using Bayesian at-
tack graphs. IEEE Transactions on Dependable and
Secure Computing, 9(1):61–74.
Roberts, S. J. and Brown, R. (2017). Intelligence-Driven
Incident Response: Outwitting the Adversary, pages
30–31. O’Reilly Media, Incorporated, Sebastopol.
Sheward, M. (2018). Hands-on incident response and digi-
tal forensics, pages 134–137. 1st edition. edition.
Soikkeli, J., Mu
˜
noz-Gonz
´
alez, L., and Lupu, E. (2019). Ef-
ficient attack countermeasure selection accounting for
recovery and action costs. In Proceedings of the 14th
International Conference on Availability, Reliability
and Security, ARES 2019, Canterbury, UK, August 26-
29, 2019, pages 3:1–3:10. ACM.
Stan, O., Bitton, R., Ezrets, M., Dadon, M., Inokuchi,
M., Ohta, Y., Yagyu, T., Elovici, Y., and Shabtai, A.
(2019). Heuristic approach towards countermeasure
selection using attack graphs. CoRR, abs/1906.10943.
Thompson, E. C. (2018). Cybersecurity Incident Response:
How to Contain, Eradicate, and Recover from Inci-
dents, pages 99–116. Apress, Berkeley, CA.
TinkerPop, A. (2021). Apache TinkerPop. https://tinkerpop.
apache.org. [Online; accessed 9. Apr. 2021].
ICISSP 2022 - 8th International Conference on Information Systems Security and Privacy
120