A survey: When moving target defense meets game theory
J Tan, H Jin, H Zhang, Y Zhang, D Chang, X Liu… - Computer Science …, 2023 - Elsevier
Moving target defense (MTD) can break through asymmetry between attackers and
defenders. To improve the effectiveness of cybersecurity defense techniques, defense …
defenders. To improve the effectiveness of cybersecurity defense techniques, defense …
A dynamic games approach to proactive defense strategies against advanced persistent threats in cyber-physical systems
Abstract Advanced Persistent Threats (APTs) have recently emerged as a significant security
challenge for a cyber-physical system due to their stealthy, dynamic and adaptive nature …
challenge for a cyber-physical system due to their stealthy, dynamic and adaptive nature …
A risk management approach to defending against the advanced persistent threat
The advanced persistent threat (APT) as a new kind of cyber attack has posed a severe
threat to modern organizations. When the APT has been detected, the organization has to …
threat to modern organizations. When the APT has been detected, the organization has to …
Insider threat modeling: An adversarial risk analysis approach
Insider threats entail major security issues in many organizations. Game theoretic models of
insider threats so far proposed do not take into account important factors such as the …
insider threats so far proposed do not take into account important factors such as the …
Defense against advanced persistent threat through data backup and recovery
Advanced persistent threat (APT) as a generic highly sophisticated cyber attack poses a
severe threat to organizational data security. Since the conventional detection and repair …
severe threat to organizational data security. Since the conventional detection and repair …
Evolutionary game theoretic analysis of advanced persistent threats against cloud storage
Advanced Persistent Threats (APTs) represent stealthy, powerful, long-term, and well-
funded attacks against cyber systems, such as data centers and cloud storage. Evolutionary …
funded attacks against cyber systems, such as data centers and cloud storage. Evolutionary …
FlipIt game model-based defense strategy against cyberattacks on SCADA systems considering insider assistance
Z Liu, L Wang - IEEE Transactions on Information Forensics …, 2021 - ieeexplore.ieee.org
The industrial internet of things (IIoT) is emerging as a global trend to dramatically enhance
the intelligence and efficiency of the industries in recent years. With the emphasis on data …
the intelligence and efficiency of the industries in recent years. With the emphasis on data …
Automotive cybersecurity: Assessing a new platform for cybercrime and malicious hacking
The push for technological enhancement and Internet connectivity in all aspects of modern
life is radically transforming our use of devices and equipment that was not designed with …
life is radically transforming our use of devices and equipment that was not designed with …
Dynamic resource management to defend against advanced persistent threats in fog computing: A game theoretic approach
Fog computing has gained tremendous popularity due to its capability of addressing the
surging demand on high-quality ubiquitous mobile services. Nevertheless, the highly …
surging demand on high-quality ubiquitous mobile services. Nevertheless, the highly …
: An Adaptive Reinforcement Learning Strategy for the Security Game
A rise in Advanced Persistent Threats (APTs) has introduced a need for robustness against
long-running, stealthy attacks which circumvent existing cryptographic security guarantees …
long-running, stealthy attacks which circumvent existing cryptographic security guarantees …