Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Survey of attack projection, prediction, and forecasting in cyber security
This paper provides a survey of prediction, and forecasting methods used in cyber security.
Four main tasks are discussed first, attack projection and intention recognition, in which …
Four main tasks are discussed first, attack projection and intention recognition, in which …
Stram: Measuring the trustworthiness of computer-based systems
Various system metrics have been proposed for measuring the quality of computer-based
systems, such as dependability and security metrics for estimating their performance and …
systems, such as dependability and security metrics for estimating their performance and …
Modeling and predicting cyber hacking breaches
M Xu, KM Schweitzer, RM Bateman… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Analyzing cyber incident data sets is an important method for deepening our understanding
of the evolution of the threat situation. This is a relatively new research topic, and many …
of the evolution of the threat situation. This is a relatively new research topic, and many …
Modeling multivariate cybersecurity risks
Modeling cybersecurity risks is an important, yet challenging, problem. In this paper, we
initiate the study of modeling multivariate cybersecurity risks. We develop the first statistical …
initiate the study of modeling multivariate cybersecurity risks. We develop the first statistical …
Cybersecurity dynamics: A foundation for the science of cybersecurity
S Xu - Proactive and dynamic network defense, 2019 - Springer
Cybersecurity Dynamics is new concept that aims to achieve the modeling, analysis,
quantification, and management of cybersecurity from a holistic perspective, rather than from …
quantification, and management of cybersecurity from a holistic perspective, rather than from …
A case study on using deep learning for network intrusion detection
Deep Learning has been very successful in many application domains. However, its
usefulness in the context of network intrusion detection has not been systematically …
usefulness in the context of network intrusion detection has not been systematically …
Metrics towards measuring cyber agility
In cyberspace, evolutionary strategies are commonly used by both attackers and defenders.
For example, an attacker's strategy often changes over the course of time, as new …
For example, an attacker's strategy often changes over the course of time, as new …
The cybersecurity dynamics way of thinking and landscape
S Xu - Proceedings of the 7th ACM Workshop on Moving …, 2020 - dl.acm.org
The Cybersecurity Dynamics framework offers an approach to systematically understanding,
characterizing, quantifying and managing cybersecurity from a holistic perspective. The …
characterizing, quantifying and managing cybersecurity from a holistic perspective. The …
A vine copula model for predicting the effectiveness of cyber defense early-warning
abstract Internet-based computer information systems play critical roles in many aspects of
modern society. However, these systems are constantly under cyber attacks that can cause …
modern society. However, these systems are constantly under cyber attacks that can cause …
Automatically predicting cyber attack preference with attributed heterogeneous attention networks and transductive learning
Predicting cyber attack preference of intruders is essential for security organizations to
demystify attack intents and proactively handle oncoming cyber threats. In order to …
demystify attack intents and proactively handle oncoming cyber threats. In order to …