Reinforcement learning for feedback-enabled cyber resilience
The rapid growth in the number of devices and their connectivity has enlarged the attack
surface and made cyber systems more vulnerable. As attackers become increasingly …
surface and made cyber systems more vulnerable. As attackers become increasingly …
A systematic review of cyber-resilience assessment frameworks
Cyber-attacks are regarded as one of the most serious threats to businesses worldwide.
Organizations dependent on Information Technology (IT) derive value not only from …
Organizations dependent on Information Technology (IT) derive value not only from …
Expanding the Gordon-Loeb model to cyber-insurance
HRK Skeoch - Computers & Security, 2022 - Elsevier
We present an economic model for decisions on competing cyber-security and cyber-
insurance investment based on the Gordon-Loeb model for investment in information …
insurance investment based on the Gordon-Loeb model for investment in information …
Interdependent strategic security risk management with bounded rationality in the internet of things
With the increasing connectivity enabled by the Internet of Things (IoT), security becomes a
critical concern, and users should invest to secure their IoT applications. Due to the massive …
critical concern, and users should invest to secure their IoT applications. Due to the massive …
: A Game-Theoretic Cyber Insurance Framework for Incentive-Compatible Cyber Risk Management of Internet of Things
Internet of Things (IoT) is highly vulnerable to emerging Advanced Persistent Threats (APTs)
that are often operated by well-resourced adversaries. Achieving perfect security for IoT …
that are often operated by well-resourced adversaries. Achieving perfect security for IoT …
Adaptive honeypot engagement through reinforcement learning of semi-markov decision processes
A honeynet is a promising active cyber defense mechanism. It reveals the fundamental
Indicators of Compromise (IoCs) by luring attackers to conduct adversarial behaviors in a …
Indicators of Compromise (IoCs) by luring attackers to conduct adversarial behaviors in a …
[PDF][PDF] Dynamic games for secure and resilient control system design
Modern control systems are featured by their hierarchical structure composed of cyber,
physical and human layers. The intricate dependencies among multiple layers and units of …
physical and human layers. The intricate dependencies among multiple layers and units of …
Cybersecurity in robotics: Challenges, quantitative modeling, and practice
Robotics is becoming more and more ubiquitous, but the pressure to bring systems to
market occasionally goes at the cost of neglecting security mechanisms during the …
market occasionally goes at the cost of neglecting security mechanisms during the …
Cyber insurance against cyberattacks on electric vehicle charging stations
Cyberattacks in the energy sector are commonplace. Load-altering cyberattacks launched
via the manipulations of high-wattage appliances and assets are particularly alarming, as …
via the manipulations of high-wattage appliances and assets are particularly alarming, as …
Game theory meets network security: A tutorial
The increasingly pervasive connectivity of today's information systems brings up new
challenges to security. Traditional security has accomplished a long way toward protecting …
challenges to security. Traditional security has accomplished a long way toward protecting …