A survey on advanced persistent threats: Techniques, solutions, challenges, and research opportunities
Threats that have been primarily targeting nation states and their associated entities have
expanded the target zone to include the private and corporate sectors. This class of threats …
expanded the target zone to include the private and corporate sectors. This class of threats …
Toward proactive, adaptive defense: A survey on moving target defense
Reactive defense mechanisms, such as intrusion detection systems, have made significant
efforts to secure a system or network for the last several decades. However, the nature of …
efforts to secure a system or network for the last several decades. However, the nature of …
A survey of moving target defenses for network security
Network defenses based on traditional tools, techniques, and procedures (TTP) fail to
account for the attacker's inherent advantage present due to the static nature of network …
account for the attacker's inherent advantage present due to the static nature of network …
[HTML][HTML] Security defense decision method based on potential differential game for complex networks
H Zhang, Y Mi, Y Fu, X Liu, Y Zhang, J Wang, J Tan - Computers & Security, 2023 - Elsevier
Most defense strategies in complex networks are developed from the defense perspective,
overlooking the key attack-defense characteristics in cybersecurity. A defense decision …
overlooking the key attack-defense characteristics in cybersecurity. A defense decision …
A game-theoretic taxonomy and survey of defensive deception for cybersecurity and privacy
Cyberattacks on both databases and critical infrastructure have threatened public and
private sectors. Ubiquitous tracking and wearable computing have infringed upon privacy …
private sectors. Ubiquitous tracking and wearable computing have infringed upon privacy …
Game theory in internet of things: A survey
C Chi, Y Wang, X Tong, M Siddula… - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
Internet of Things (IoT) devices are being used widely in the fields of smart city, smart grid,
environmental monitoring, Internet of Vehicles and other fields that need large-scale sensing …
environmental monitoring, Internet of Vehicles and other fields that need large-scale sensing …
Three decades of deception techniques in active cyber defense-retrospect and outlook
L Zhang, VLL Thing - Computers & Security, 2021 - Elsevier
Deception techniques have been widely seen as a game changer in cyber defense. In this
paper, we review representative techniques in honeypots, honeytokens, and moving target …
paper, we review representative techniques in honeypots, honeytokens, and moving target …
A survey: When moving target defense meets game theory
J Tan, H Jin, H Zhang, Y Zhang, D Chang, X Liu… - Computer Science …, 2023 - Elsevier
Moving target defense (MTD) can break through asymmetry between attackers and
defenders. To improve the effectiveness of cybersecurity defense techniques, defense …
defenders. To improve the effectiveness of cybersecurity defense techniques, defense …
Intrusion detection systems in the cloud computing: A comprehensive and deep literature review
Z Liu, B Xu, B Cheng, X Hu… - … : Practice and Experience, 2022 - Wiley Online Library
Abrupt development of resources and rising expenses of infrastructure are leading
institutions to take on cloud computing. Albeit, the cloud environment is vulnerable to various …
institutions to take on cloud computing. Albeit, the cloud environment is vulnerable to various …
Toward scalable graph-based security analysis for cloud networks
Cloud-based systems and services are seeing exponential growth in the last few years.
Many companies and digital services are actively migrating their storage and computational …
Many companies and digital services are actively migrating their storage and computational …