A game-theoretic taxonomy and survey of defensive deception for cybersecurity and privacy

J Pawlick, E Colbert, Q Zhu - ACM Computing Surveys (CSUR), 2019 - dl.acm.org
Cyberattacks on both databases and critical infrastructure have threatened public and
private sectors. Ubiquitous tracking and wearable computing have infringed upon privacy …

Moving target defense techniques: A survey

C Lei, HQ Zhang, JL Tan, YC Zhang… - Security and …, 2018 - Wiley Online Library
As an active defense technique to change asymmetry in cyberattack‐defense confrontation,
moving target defense research has become one of the hot spots. In order to gain better …

A survey: When moving target defense meets game theory

J Tan, H Jin, H Zhang, Y Zhang, D Chang, X Liu… - Computer Science …, 2023 - Elsevier
Moving target defense (MTD) can break through asymmetry between attackers and
defenders. To improve the effectiveness of cybersecurity defense techniques, defense …

[图书][B] Game theory for cyber deception

J Pawlick, Q Zhu - 2021 - Springer
Interactions both online and in the emerging Internet of things (IoT) feature distributed
agents with local decision-making capabilities and misaligned incentives. This has …

Explainable intelligence-driven defense mechanism against advanced persistent threats: A joint edge game and AI approach

H Li, J Wu, H Xu, G Li, M Guizani - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Advanced persistent threats (APT) have novel features such as long-term latency, precision
strikes and uncertain strategies. APT poses severe threats to the resource-limited edge …

Attacker-centric view of a detection game against advanced persistent threats

L Xiao, D Xu, NB Mandayam… - IEEE transactions on …, 2018 - ieeexplore.ieee.org
Advanced persistent threats (APTs) are a major threat to cyber-security, causing significant
financial and privacy losses each year. In this paper, cumulative prospect theory (CPT) is …

CLOSURE: A cloud scientific workflow scheduling algorithm based on attack–defense game model

Y Wang, Y Guo, Z Guo, T Baker, W Liu - Future Generation Computer …, 2020 - Elsevier
The multi-tenant coexistence service mode makes the cloud-based scientific workflow
encounter the risks of being intruded. For this problem, we propose a CLoud scientific …

Defensive deception against reactive jamming attacks in remote state estimation

K Ding, X Ren, DE Quevedo, S Dey, L Shi - Automatica, 2020 - Elsevier
This paper considers a synthetic counter-measure, combining transmission scheduling and
defensive deception, to defend against jamming attacks in remote state estimation. In the …

Spatial-temporal moving target defense: A markov stackelberg game model

H Li, W Shen, Z Zheng - arXiv preprint arXiv:2002.10390, 2020 - arxiv.org
Moving target defense has emerged as a critical paradigm of protecting a vulnerable system
against persistent and stealthy attacks. To protect a system, a defender proactively changes …

Robust moving target defense against unknown attacks: A meta-reinforcement learning approach

H Li, Z Zheng - International Conference on Decision and Game …, 2022 - Springer
Moving target defense (MTD) provides a systematic framework to achieving proactive
defense in the presence of advanced and stealthy attacks. To obtain robust MTD in the face …