Automated cyber defence: A review

S Vyas, J Hannay, A Bolton, PP Burnap - arxiv preprint arxiv:2303.04926, 2023 - arxiv.org
Within recent times, cybercriminals have curated a variety of organised and resolute cyber
attacks within a range of cyber systems, leading to consequential ramifications to private and …

Reinforcement learning-based autonomous attacker to uncover computer network vulnerabilities

A Mohamed Ahmed, TT Nguyen, M Abdelrazek… - Neural Computing and …, 2024 - Springer
In today's intricate information technology landscape, the escalating complexity of computer
networks is accompanied by a myriad of malicious threats seeking to compromise network …

The New Matrix of War: Digital Dependence in Contested Environments.

KB Nordquist - Air & Space Power Journal, 2018 - search.ebscohost.com
The article discusses efforts of the US Dept. of Defense (DOD) in addressing issues of
cybercrime in the US It mentions need for understanding and countering possible strategic …

Generation of IDS Signatures through Exhaustive Execution Path Exploration in PoC Codes for Vulnerabilities

M Kobayashi, Y Kanemoto, D Kotani… - Journal of Information …, 2023 - jstage.jst.go.jp
There have been many vulnerabilities, and we need prompt countermeasures. One factor
that makes more rapid measures necessary is Proof of Concept (PoC) codes. Although they …

Metasploit 攻撃コードに対する網羅的な攻撃パケット生成による侵入検知システムのシグネチャ自動生成

小林雅季, 鐘本楊, 小谷大祐… - … シンポジウム 2020 論文集, 2020 - ipsj.ixsq.nii.ac.jp
論文抄録 一般に, 脆弱性情報の公表と前後して, PoC コードと呼ばれる, その脆弱性の実現可能性
を示すコードが公開される. ここで, PoC コードの開発に多用されるツールとして Metasploit …

[PDF][PDF] La nueva matriz de la guerra

CKB NORDQUIST, EE UU - airuniversity.af.edu
Desde el fin de la Guerra Fría, el Departamento de Defensa de los EE. UU (DOD por sus
siglas en inglés) ha demostrado su ventaja estratégica a lo largo del espectro del conflicto …