Network-Oriented Computational Analysis of Cyber-Attacks

Atakan Erdogan, Charlotte Hoffmans, Ayoeb Sbita, Eléonore Wach, Kyra Zuijderduijn, Niek Jan van den Hout, Jan Treur*, Peter H.M.P. Roelofsma

*Corresponding author for this work

Research output: Chapter in Book / Report / Conference proceedingConference contributionAcademicpeer-review

Abstract

For cybersecurity, understanding human behaviour is important and especially in phishing attacks risks can be attributed to human error. To better understand behavioural changes we performed a computational analysis by an adaptive dynamical system represented as an adaptive network model. The base network model was refined by adding training options to it and then formalised by an adaptive network model. Simulation experiments were conducted and What-If analysis and risk assessment.

Original languageEnglish
Title of host publicationResearch Perspectives on Software Engineering and Systems Design
Subtitle of host publicationProceedings of 8th Computational Methods in Systems and Software 2024, Volume 5
EditorsRadek Silhavy, Petr Silhavy
PublisherSpringer Nature Switzerland AG
Pages198-225
Number of pages28
Volume5
ISBN (Electronic)9783031967757
ISBN (Print)9783031967740
DOIs
Publication statusPublished - 2025
Event8th International Conference on Computational Methods in Systems and Software, CoMeSySo 2024 -
Duration: 12 Oct 202414 Oct 2024

Publication series

NameLecture Notes in Networks and Systems
PublisherSpringer
Volume1492 LNNS
ISSN (Print)2367-3370
ISSN (Electronic)2367-3389
NameCoMeSySo: Proceedings of the Computational Methods in Systems and Software
PublisherSpringer
Volume2024

Conference

Conference8th International Conference on Computational Methods in Systems and Software, CoMeSySo 2024
Period12/10/2414/10/24

Bibliographical note

Publisher Copyright:
© The Author(s), under exclusive license to Springer Nature Switzerland AG 2025.

Keywords

  • adaptive network
  • computational analysis
  • Cyberattacks

Fingerprint

Dive into the research topics of 'Network-Oriented Computational Analysis of Cyber-Attacks'. Together they form a unique fingerprint.

Cite this