Cyber Deception: State of the art, Trends and Open challenges
The growing interest in cybersecurity has significantly increased articles designing and
implementing various Cyber Deception (CYDEC) mechanisms. This trend reflects the urgent …
implementing various Cyber Deception (CYDEC) mechanisms. This trend reflects the urgent …
A Deep Reinforcement Learning-based Deception Asset Selection Algorithm in Differential Games
W He, J Tan, Y Guo, K Shang… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Currently, there are various problems in the field of network attack-defense analysis and
deception asset deployment of game theory-based, such as difficulties in constructing attack …
deception asset deployment of game theory-based, such as difficulties in constructing attack …
Deception in Drone Surveillance Missions: Strategic vs. Learning Approaches
Unmanned Aerial Vehicles (UAVs) have been used for surveillance operations, search and
rescue missions, and delivery services. Given their importance and versatility, they naturally …
rescue missions, and delivery services. Given their importance and versatility, they naturally …
Research on Multi-stage Proactive Defense Strategy against Intelligent Penetration Attacks
B Hou, S Feng, B Wang, J Yin, J Dai… - 2023 IEEE 6th …, 2023 - ieeexplore.ieee.org
In response to the emerging threat of AI-enabled penetration attacks, characterized by their
high level of automation and adaptability, this paper proposes a multi-stage proactive …
high level of automation and adaptability, this paper proposes a multi-stage proactive …
Mee: Adaptive Honeyfile System for Insider Attacker Detection
Insider attacks cause significant cybersecurity breaches. They challenge current
cybersecurity approaches. Specifically, in advanced persistent threats (APTs), an adversary …
cybersecurity approaches. Specifically, in advanced persistent threats (APTs), an adversary …
КОНЦЕПТУАЛЬНА МОДЕЛЬ АРХІТЕКТУРИ МУЛЬТИКОМП'ЮТЕРНИХ СИСТЕМ ІЗ ПРИМАНКАМИ ТА ПАСТКАМИ ДЛЯ ВИЯВЛЕННЯ ТА ПРОТИДІЇ …
А КАШТАЛЬЯН - Information Technology: Computer …, 2023 - journals.politehnica.dp.ua
Анотація В роботі здійснено аналіз такого класу систем виявлення та протидії
зловмисному програмному забезпеченню та комп'ютерним атакам як обманні системи …
зловмисному програмному забезпеченню та комп'ютерним атакам як обманні системи …