Abusive adversarial agents and attack strategies in cyber‐physical systems
VS Gaur, V Sharma, J McAllister - CAAI Transactions on …, 2023 - Wiley Online Library
The exponential increase in IoT device usage has spawned numerous cyberspace
innovations. IoT devices, sensors, and actuators bridge the gap between physical processes …
innovations. IoT devices, sensors, and actuators bridge the gap between physical processes …
Offensive security: Cyber threat intelligence enrichment with counterintelligence and counterattack
Cyber-attacks on financial institutions and corporations are on the rise, particularly during
pandemics. These attacks are becoming more sophisticated. Reports of hacking activities …
pandemics. These attacks are becoming more sophisticated. Reports of hacking activities …
SOD2G: A study on a social-engineering organizational defensive deception game framework through optimization of spatiotemporal MTD and decoy conflict
S Seo, D Kim - Electronics, 2021 - mdpi.com
Existing moving target defense (MTD) and decoy systems are conceptually limited in
avoiding and preventing attackers' social-engineering real-time attacks by organization …
avoiding and preventing attackers' social-engineering real-time attacks by organization …
IoDM: A study on a IoT-based organizational deception modeling with adaptive general-sum game competition
S Seo, D Kim - Electronics, 2022 - mdpi.com
Moving target defense (MTD) and decoy strategies, measures of active defense, were
introduced to secure both the proactive security and reactive adaptability of internet-of-things …
introduced to secure both the proactive security and reactive adaptability of internet-of-things …
Resisting multiple advanced persistent threats via hypergame-theoretic defensive deception
Existing defensive deception (DD) approaches apply game theory, assuming that an
attacker and defender play the same, full game with all possible strategies. However, in …
attacker and defender play the same, full game with all possible strategies. However, in …
Data protection psychology using game theory
M Nkongolo, J Sewnath - arXiv preprint arXiv:2402.07905, 2024 - arxiv.org
The research aims to explore how individuals perceive and interact with data protection
practices in an era of increasing reliance on technology and the widespread availability of …
practices in an era of increasing reliance on technology and the widespread availability of …
About the project
R Broady, L West - biocanrx.com
For many patients with blood cancers like leukemia, the only option for a cure is a
hematopoietic stem cell transplant (HSCT) in which the patient receives immune cells from a …
hematopoietic stem cell transplant (HSCT) in which the patient receives immune cells from a …
[图书][B] Effective Defensive Cyber Deception
C Liscomb - 2021 - search.proquest.com
This research explored defensive cyber deception and whether effective deceivers from a
psychological perspective could enhance existing defensive deception strategies. The data …
psychological perspective could enhance existing defensive deception strategies. The data …