Gazeta: Game-theoretic zero-trust authentication for defense against lateral movement in 5g iot networks
The increasing connectivity in the 5G Internet of Things networks has enlarged the attack
surface and made the traditional security defense inadequate for sophisticated attackers …
surface and made the traditional security defense inadequate for sophisticated attackers …
A first order meta stackelberg method for robust federated learning
Previous research has shown that federated learning (FL) systems are exposed to an array
of security risks. Despite the proposal of several defensive strategies, they tend to be non …
of security risks. Despite the proposal of several defensive strategies, they tend to be non …
Explainable AI for Industry 5.0: Vision, Architecture, and Potential Directions
The Industrial Revolution has shifted toward Industry 5.0, reinventing the Industry 4.0
operational process by introducing human elements into critical decision processes. Industry …
operational process by introducing human elements into critical decision processes. Industry …
Meta stackelberg game: Robust federated learning against adaptive and mixed poisoning attacks
Federated learning (FL) is susceptible to a range of security threats. Although various
defense mechanisms have been proposed, they are typically non-adaptive and tailored to …
defense mechanisms have been proposed, they are typically non-adaptive and tailored to …
[HTML][HTML] Dissecting zero trust: research landscape and its implementation in IoT
C Liu, R Tan, Y Wu, Y Feng, Z **, F Zhang, Y Liu, Q Liu - Cybersecurity, 2024 - Springer
As a progressive security strategy, the zero trust model has attracted notable attention and
importance within the realm of network security, especially in the context of the Internet of …
importance within the realm of network security, especially in the context of the Internet of …
Decision-dominant strategic defense against lateral movement for 5g zero-trust multi-domain networks
Multi-domain warfare is a military doctrine that leverages capabilities from different domains,
including air, land, sea, space, and cyberspace, to create a highly interconnected battle …
including air, land, sea, space, and cyberspace, to create a highly interconnected battle …
Foundations of cyber resilience: The confluence of game, control, and learning theories
Q Zhu - arxiv preprint arxiv:2404.01205, 2024 - arxiv.org
Cyber resilience is a complementary concept to cybersecurity, focusing on the preparation,
response, and recovery from cyber threats that are challenging to prevent. Organizations …
response, and recovery from cyber threats that are challenging to prevent. Organizations …
On the Price of Transparency: A Comparison between Overt Persuasion and Covert Signaling
Transparency of information disclosure has always been considered an instrumental
component of effective governance, accountability, and ethical behavior in any organization …
component of effective governance, accountability, and ethical behavior in any organization …
Symbiotic Game and Foundation Models for Cyber Deception Operations in Strategic Cyber Warfare
We are currently facing unprecedented cyber warfare with the rapid evolution of tactics,
increasing asymmetry of intelligence, and the growing accessibility of hacking tools. In this …
increasing asymmetry of intelligence, and the growing accessibility of hacking tools. In this …
Commitment with signaling under double-sided information asymmetry
Information asymmetry in games enables players with the information advantage to
manipulate others' beliefs by strategically revealing information to other players. This work …
manipulate others' beliefs by strategically revealing information to other players. This work …