Abusive adversarial agents and attack strategies in cyber‐physical systems

VS Gaur, V Sharma, J McAllister - CAAI Transactions on …, 2023 - Wiley Online Library
The exponential increase in IoT device usage has spawned numerous cyberspace
innovations. IoT devices, sensors, and actuators bridge the gap between physical processes …

Offensive security: Cyber threat intelligence enrichment with counterintelligence and counterattack

MU Rana, O Ellahi, M Alam, JL Webber… - IEEE …, 2022 - ieeexplore.ieee.org
Cyber-attacks on financial institutions and corporations are on the rise, particularly during
pandemics. These attacks are becoming more sophisticated. Reports of hacking activities …

SOD2G: A study on a social-engineering organizational defensive deception game framework through optimization of spatiotemporal MTD and decoy conflict

S Seo, D Kim - Electronics, 2021 - mdpi.com
Existing moving target defense (MTD) and decoy systems are conceptually limited in
avoiding and preventing attackers' social-engineering real-time attacks by organization …

IoDM: A study on a IoT-based organizational deception modeling with adaptive general-sum game competition

S Seo, D Kim - Electronics, 2022 - mdpi.com
Moving target defense (MTD) and decoy strategies, measures of active defense, were
introduced to secure both the proactive security and reactive adaptability of internet-of-things …

Resisting multiple advanced persistent threats via hypergame-theoretic defensive deception

Z Wan, JH Cho, M Zhu, AH Anwar… - … on Network and …, 2023 - ieeexplore.ieee.org
Existing defensive deception (DD) approaches apply game theory, assuming that an
attacker and defender play the same, full game with all possible strategies. However, in …

Data protection psychology using game theory

M Nkongolo, J Sewnath - arXiv preprint arXiv:2402.07905, 2024 - arxiv.org
The research aims to explore how individuals perceive and interact with data protection
practices in an era of increasing reliance on technology and the widespread availability of …

About the project

R Broady, L West - biocanrx.com
For many patients with blood cancers like leukemia, the only option for a cure is a
hematopoietic stem cell transplant (HSCT) in which the patient receives immune cells from a …

[图书][B] Effective Defensive Cyber Deception

C Liscomb - 2021 - search.proquest.com
This research explored defensive cyber deception and whether effective deceivers from a
psychological perspective could enhance existing defensive deception strategies. The data …