A data-driven approach to prioritize MITRE ATT&CK techniques for active directory adversary emulation
Abstract Advanced Persistent Threats (APTs) continue to evolve, employing sophisticated and evasive techniques that pose significant challenges to modern defense mechanisms, particularly in Active Directory (AD) environments. Adversary emulation serves as a proactive security strategy, enabling orga...
Saved in:
| Main Authors: | Alshaimaa Abo-alian, Mahmoud Youssef, Nagwa L. Badr |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Nature Portfolio
2025-07-01
|
| Series: | Scientific Reports |
| Subjects: | |
| Online Access: | https://doi.org/10.1038/s41598-025-12948-x |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Assessment of the Distributed Ledger Technology for Energy Sector Industrial and Operational Applications Using the MITRE ATT&CK® ICS Matrix
by: Annabelle Lee, et al.
Published: (2023-01-01) -
Introducing UWF-ZeekData24: An Enterprise MITRE ATT&CK Labeled Network Attack Traffic Dataset for Machine Learning/AI
by: Marshall Elam, et al.
Published: (2025-04-01) -
Enhancing cybersecurity resilience through advanced red-teaming exercises and MITRE ATT&CK framework integration: A paradigm shift in cybersecurity assessment
by: Semi Yulianto, et al.
Published: (2025-12-01) -
Securing Maritime Autonomous Surface Ships: Cyber Threat Scenarios and Testbed Validation
by: Seongmin Lee, et al.
Published: (2025-01-01) -
A framework for cyber threat modeling and risk assessment in smart city environments
by: Mariya Ouaissa, et al.
Published: (2025-07-01)