A Comprehensive State-of-the-Art Review for Digital Twin: Cybersecurity Perspectives and Open Challenges

A Jaber, I Koufos, M Christopoulou - … on P2P, Parallel, Grid, Cloud and …, 2024 - Springer
The growing complexity and interconnectivity of modern systems have made the proactive
identification and mitigation of vulnerabilities increasingly challenging. DTs, which offer …

A stackelberg game model for botnet data exfiltration

T Nguyen, MP Wellman, S Singh - Decision and Game Theory for Security …, 2017 - Springer
Cyber-criminals can distribute malware to control computers on a networked system and
leverage these compromised computers to perform their malicious activities inside the …

[PDF][PDF] A Stackelberg Game Model for Botnet Traffic Exfiltration

TH Nguyen, MP Wellman, S Singh - Workshops at the Thirty-First AAAI …, 2017 - cdn.aaai.org
Cyber-criminals can distribute malware to control computers on a networked system and
leverage these compromised computers (ie, botnets) to perform their malicious activities …