ity strategies, often outperforming human skill. Our
approach aids security analysts in event analysis and
CPS security solution development. (VM) detects and
captures adversaries and vulnerabilities, then analy-
ses the attack’s target using a domain-specific tech-
nique. The Attack Model (AM) is created by build-
ing a model based on the adversaries provided in the
VM. The behavioural model (BM) annotates system
behaviours of the VM and AM. EM events are derived
from behavioural models. The models above help the
XA4AS Security Evolution Manager and Adaptation
Manager. Our approach needs more case studies in
order to demonstrate its efficacy.
REFERENCES
Van den Berg, B.; Kuipers, S. Vulnerabilities and Cy-
berspace: A New Kind of Crises. In Oxford Re-
search Encyclopedia of Politics; Universiteit Lei-
den—LUMC: Leiden, The Netherlands, 202
Pursiainen, C. Critical infrastructure resilience: A Nordic
model in the making? Int. J. Disaster Risk Reduct.
2018, 27, 632–641.
Wang, E.K.; Ye, Y.; Xu, X.; Yiu, S.-M.; Hui, L.C.K.; Chow,
K.-P. Security issues and challenges for cyber phys-
ical system. In Proceedings of the 2010 IEEE/ACM
Int’l Conference on Green Computing and Commu-
nications & Int’l Conference on Cyber, Physical and
Social Computing, Hangzhou, China, 18–20 Decem-
ber 2010; pp. 733–738.
Uzunov, A.V.; Ferncez, E.B.; Falkner, K. Engineering secu-
rity into distributed systems: A survey of methodolo-
gies. J. UCS 2012, 18, 2920–3006.
Gopstein, A.; Gopstein, A.; Nguyen, C.; Byrnett, D.S.;
Worthington, K.; Villarreal, C. Framework and
Roadmap for Smart Grid Interoperability Standards
Regional Roundtables Summary Report; US Depart-
ment of Commerce, National Institute of Standards
and Technology: Gaithersburg, MD, USA, 2020.
Mancuso, V.F.; Strang, A.J.; Funke, G.J. ; Finomore, V.S.
Human factors of cyber attacks: A framework for
human-centered research. In Proceedings of the Hu-
man Factors and Ergonomics Society Annual Meet-
ing, Chicago, IL, USA, 27–31 October 2014; SAGE
Publications: Los Angeles, CA, USA, 2014; Volume
58, pp. 437–441.
Urbach, N.; Roeglinger, M. Introduction to Digitalization
Cases: How Organizations Rethink Their Business
for the Digital Age; Springer: Berlin/Heidelberg, Ger-
many, 2019
Ponemon, L. Cost of Data Breach Study: Global Analysis;
Technical Report; Poneomon Institute: Traverse City,
MI, USA, 2015.
Shostack, A. Threat Modeling: Designing for Security;
John Wiley & Sons: Hoboken, NJ, USA , 2014.
Griffor, E. R., Greer, C., Wollman, D. A., Burns, M. J.,
et al. (2017). Framework for cyber-physical systems:
Volume 1, overview.
Boyes, H., Hallaq, B., Cunningham, J., and Watson, T.
(2018). The industrial internet of things (iiot): An
analysis framework
Banerjee, A., Venkatasubramanian, K. K., Mukherjee, T.,
and Gupta, S. K. S. (2012). Ensuring safety, security,
and sustainability of mission-critical cyber–physical
systems. Proceedings of the IEEE, 100(1):283–299.
K. Angelopoulos, V. E. S. Souza, and J. Mylopoulos.
Dealing with multiple failures in zanshin: a control-
theoretic approach. In SEAMS 14, pages 165–174.
ACM, 2014.
Markopoulou, D.; Papakonstantinou, V. The regulatory
framework for the protection of critical infrastructures
against cyberthreats: Identifying shortcomings and
addressing future challenges: The case of the health
sector in particular. Comput. Law Secur. Rev. 2021,
41, 105502.
Calderaro, A.; Blumfelde, S. Artificial intelligence and EU
security: The false promise of digital sovereignty. Eur.
Secur. 2022, 31, 415–434. .
Hsieh, H.F.; Shannon, S.E. Three approaches to qualita-
tive content analysis. Qual. Health Res. 2005, 15,
1277–1288
Papakonstantinou, V. Cybersecurity as praxis and as a state:
The EU law path towards acknowledgement of a new
right to cybersecurity? Comput. Law Secur. Rev.
2022, 44, 105653
Osei-Kyei, R.; Tam, V.; Ma, M.; Mashiri, F. Critical review
of the threats affecting the building of critical infras-
tructure resilience. Int. J. Disaster Risk Reduct. 2021,
60, 102316
Caldarulo, M.; Welch, E.W.; Feeney, M.K. Determinants of
cyber-incidents among small and medium US cities.
Gov. Inf. Q. 2022, 39, 101703.
Agrafiotis, I.; Nurse, J.R.; Goldsmith, M.; Creese, S.; Up-
ton, D. A taxonomy of cyber-harms: Defining the
impacts of cyber-attacks and understanding how they
propagate. J. Cybersecur. 2018, 4, tyy006
Kaiya, H.; Kono, S.; Ogata, S.; Okubo, T.; Yoshioka,
N.; Washizaki, H.; Kaijiri, K. Security requirements
analysis using knowledge in capec. In Advanced In-
formation Systems Engineering Workshops; Springer:
Berlin/Heidelberg, Germany, 2014; pp. 343–348.
Boin, A. The transboundary crisis: Why we are unprepared
and the road ahead. J. Contingencies Crisis Manag.
2019, 27, 94–99.
Harry, C.; Gallagher, N. Classifying cyber events. J. Inf.
Warf. 2018, 17, 17–31.
Syafrizal, M.; Selamat, S.R.; Zakaria, N.A. AVOIDITALS:
Enhanced Cyber-attack Taxonomy in Securing Infor-
mation Technology Infrastructure. Int. J. Comput. Sci.
Netw. Secur. 2021, 21, 1–12.
Mitnick, K.D.; Simon, W.L. The Art of Deception: Con-
trolling the Human Element of Security; John Wiley
& Sons: Hoboken, NJ, USA, 2011
Shevchenko, P.V.; Jang, J.; Malavasi, M.; Peters, G.W.;
Sofronov, G.; Tr
¨
uck, S. The nature of losses from
cyber-related events: Risk categories and business
sectors. J. Cyberse-Curity 2023, 9, tyac016
Simmons, C.; Ellis, C.; Shiva, S.; Dasgupta, D.;Wu, Q.
AVOIDIT: A Cyber Attack Taxonomy. In Proceedings
IoTBDS 2024 - 9th International Conference on Internet of Things, Big Data and Security
292