Research Article

Design of Threat Response Modeling Language for Attacker Profile Based on Probability Distribution

Table 4

Comparison of experimental methods of several TMS models.

MethodSecurity engineeringAttack intent inferenceAttack path inferenceUncertainty analysisTactic, techniqueAttacker features

P2CySeMoL [41]
pwnPr3d [42]
SecML [43]
FMMLx [40]
BPATSM [44]
PowerLang [17]
CoreLang [18]
EnterpriseLang [16, 45]
IoTsecM [46]
TRMLang