A survey: When moving target defense meets game theory
J Tan, H **, H Zhang, Y Zhang, D Chang, X Liu… - Computer Science …, 2023 - Elsevier
Moving target defense (MTD) can break through asymmetry between attackers and
defenders. To improve the effectiveness of cybersecurity defense techniques, defense …
defenders. To improve the effectiveness of cybersecurity defense techniques, defense …
A systematic review on game-theoretic models and different types of security requirements in cloud environment: challenges and opportunities
The presented survey paper explores the application of game theoretic models for
addressing security challenges in cloud computing environments. It highlights the …
addressing security challenges in cloud computing environments. It highlights the …
[HTML][HTML] Security defense decision method based on potential differential game for complex networks
H Zhang, Y Mi, Y Fu, X Liu, Y Zhang, J Wang, J Tan - Computers & Security, 2023 - Elsevier
Most defense strategies in complex networks are developed from the defense perspective,
overlooking the key attack-defense characteristics in cybersecurity. A defense decision …
overlooking the key attack-defense characteristics in cybersecurity. A defense decision …
An empirical client cloud environment to secure data communication with alert protocol
Cloud computing is a technology that provides resources and utility services based on user
demand. Due to this demand, efficient cloud security protocols are highly required …
demand. Due to this demand, efficient cloud security protocols are highly required …
Defensive deception framework against reconnaissance attacks in the cloud with deep reinforcement learning
H Li, Y Guo, S Huo, H Hu, P Sun - Science China Information Sciences, 2022 - Springer
Implementing defensive deception in the cloud is promising to proactively counter
reconnaissance attack. This technique presents decoys to camouflage cloud assets and …
reconnaissance attack. This technique presents decoys to camouflage cloud assets and …
Cybersecurity threat assessment integrating qualitative differential and evolutionary games
H Zhang, J Tan, X Liu, S Huang, H Hu… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Most current game theory-based cybersecurity analysis methods use traditional game
models, which do not meet realistic conditions of continuous dynamic changes in attack …
models, which do not meet realistic conditions of continuous dynamic changes in attack …
Optimal network defense strategy selection method: a stochastic differential game model
Y Mi, H Zhang, H Hu, J Tan… - Security and …, 2021 - Wiley Online Library
In a real‐world network confrontation process, attack and defense actions change rapidly
and continuously. The network environment is complex and dynamically random. Therefore …
and continuously. The network environment is complex and dynamically random. Therefore …
Search for Articles
CS Tiwari, VK Jha - 2023 - mecs-press.org
Cloud computing is a cutting-edge system that's widely considered the future of data
processing, making cloud computing one of the widely used platforms worldwide. Cloud …
processing, making cloud computing one of the widely used platforms worldwide. Cloud …
Enhancing cloud security: harnessing bayesian game theory for a dynamic defense mechanism
Security challenges in complex information technologies continue to grow and diversify. To
improve network security, many researchers have explored the game theoretic approach as …
improve network security, many researchers have explored the game theoretic approach as …
Research on the evolution of tripartite data protection strategy based on game theory
M Yang, L Feng, X Zhang - Journal of Algorithms & …, 2023 - journals.sagepub.com
In recent years, data leakage incidents have been frequently exposed, and personal privacy
protection has become a major issue. To explore the laws of data leakage and solve …
protection has become a major issue. To explore the laws of data leakage and solve …