About AttackModels.com
AttackModels.com is a curated knowledge hub for attack modeling across IT, cloud, and cyber-physical systems. The intent is simple: make the best attack model concepts and references easy to find, easy to compare, and easy to apply.
Editorial Principles
- Primary sources first. Prefer standards, specifications, and original papers over summaries.
- Operational relevance. Every concept should connect to a real use case: engineering, detection, response, testing, or resilience planning.
- Clear terminology. Where communities disagree on definitions, the site states the definition used and links to the sources.
- Ethical use. Content is written to support defense, education, and research.
Related Resources
If you want deeper dives on specific subtopics, these related resources may help:
- AttackModeling.com focuses on the practice of modeling: workflows, templates, and how to run modeling in real teams.
- AttackGraphs.com focuses on graphs: generation, scoring, tooling, and graph-based analysis.
Contact
Send corrections, missing references, or suggested model families to:
Disclaimer
This site is educational. It does not provide legal advice, and it is not intended to enable wrongdoing. If you work with real systems, follow applicable laws, obtain authorization, and apply safe testing practices.