A game-theoretic taxonomy and survey of defensive deception for cybersecurity and privacy
Cyberattacks on both databases and critical infrastructure have threatened public and
private sectors. Ubiquitous tracking and wearable computing have infringed upon privacy …
private sectors. Ubiquitous tracking and wearable computing have infringed upon privacy …
Moving target defense techniques: A survey
C Lei, HQ Zhang, JL Tan, YC Zhang… - Security and …, 2018 - Wiley Online Library
As an active defense technique to change asymmetry in cyberattack‐defense confrontation,
moving target defense research has become one of the hot spots. In order to gain better …
moving target defense research has become one of the hot spots. In order to gain better …
A survey: When moving target defense meets game theory
J Tan, H Jin, H Zhang, Y Zhang, D Chang, X Liu… - Computer Science …, 2023 - Elsevier
Moving target defense (MTD) can break through asymmetry between attackers and
defenders. To improve the effectiveness of cybersecurity defense techniques, defense …
defenders. To improve the effectiveness of cybersecurity defense techniques, defense …
Explainable intelligence-driven defense mechanism against advanced persistent threats: A joint edge game and AI approach
Advanced persistent threats (APT) have novel features such as long-term latency, precision
strikes and uncertain strategies. APT poses severe threats to the resource-limited edge …
strikes and uncertain strategies. APT poses severe threats to the resource-limited edge …
Attacker-centric view of a detection game against advanced persistent threats
L Xiao, D Xu, NB Mandayam… - IEEE transactions on …, 2018 - ieeexplore.ieee.org
Advanced persistent threats (APTs) are a major threat to cyber-security, causing significant
financial and privacy losses each year. In this paper, cumulative prospect theory (CPT) is …
financial and privacy losses each year. In this paper, cumulative prospect theory (CPT) is …
CLOSURE: A cloud scientific workflow scheduling algorithm based on attack–defense game model
The multi-tenant coexistence service mode makes the cloud-based scientific workflow
encounter the risks of being intruded. For this problem, we propose a CLoud scientific …
encounter the risks of being intruded. For this problem, we propose a CLoud scientific …
Defensive deception against reactive jamming attacks in remote state estimation
This paper considers a synthetic counter-measure, combining transmission scheduling and
defensive deception, to defend against jamming attacks in remote state estimation. In the …
defensive deception, to defend against jamming attacks in remote state estimation. In the …
Spatial-temporal moving target defense: A markov stackelberg game model
Moving target defense has emerged as a critical paradigm of protecting a vulnerable system
against persistent and stealthy attacks. To protect a system, a defender proactively changes …
against persistent and stealthy attacks. To protect a system, a defender proactively changes …
Robust moving target defense against unknown attacks: A meta-reinforcement learning approach
Moving target defense (MTD) provides a systematic framework to achieving proactive
defense in the presence of advanced and stealthy attacks. To obtain robust MTD in the face …
defense in the presence of advanced and stealthy attacks. To obtain robust MTD in the face …