A survey: When moving target defense meets game theory

J Tan, H **, H Zhang, Y Zhang, D Chang, X Liu… - Computer Science …, 2023 - Elsevier
Moving target defense (MTD) can break through asymmetry between attackers and
defenders. To improve the effectiveness of cybersecurity defense techniques, defense …

Anomaly detection with graph convolutional networks for insider threat and fraud detection

J Jiang, J Chen, T Gu, KKR Choo, C Liu… - MILCOM 2019-2019 …, 2019 - ieeexplore.ieee.org
Anomaly detection generally involves the extraction of features from entities' or users'
properties, and the design of anomaly detection models using machine learning or deep …

Machine learning approaches to detect, prevent and mitigate malicious insider threats: State-of-the-art review

A Jaiswal, P Dwivedi, RK Dewang - Multimedia Tools and Applications, 2024 - Springer
Insider threats are profoundly damaging and pose serious security challenges. These
threats, perpetrated by insiders, may arise from delinquency, retaliation, or motives such as …

Effective repair strategy against advanced persistent threat: A differential game approach

LX Yang, P Li, Y Zhang, X Yang… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Advanced persistent threat (APT) is a new kind of cyberattack that poses a serious threat to
modern society. When an APT campaign on an organization has been identified, the …

A high accuracy and adaptive anomaly detection model with dual-domain graph convolutional network for insider threat detection

X Li, X Li, J Jia, L Li, J Yuan, Y Gao… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Insider threat is destructive and concealable, making addressing it a challenging task in
cybersecurity. Most existing methods transform user behavior into sequential information …

A risk management approach to defending against the advanced persistent threat

LX Yang, P Li, X Yang, YY Tang - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
The advanced persistent threat (APT) as a new kind of cyber attack has posed a severe
threat to modern organizations. When the APT has been detected, the organization has to …

Defense against advanced persistent threat through data backup and recovery

LX Yang, K Huang, X Yang, Y Zhang… - … on Network Science …, 2020 - ieeexplore.ieee.org
Advanced persistent threat (APT) as a generic highly sophisticated cyber attack poses a
severe threat to organizational data security. Since the conventional detection and repair …

FlipIt game model-based defense strategy against cyberattacks on SCADA systems considering insider assistance

Z Liu, L Wang - IEEE Transactions on Information Forensics …, 2021 - ieeexplore.ieee.org
The industrial internet of things (IIoT) is emerging as a global trend to dramatically enhance
the intelligence and efficiency of the industries in recent years. With the emphasis on data …

[HTML][HTML] The evolution of the flip-it game in cybersecurity: Insights from the past to the future

MT Jafar, LX Yang, G Li, X Yang - … of King Saud University-Computer and …, 2024 - Elsevier
Cybercrime statistics highlight the severe and growing impact of digital threats on individuals
and organizations, with financial losses escalating rapidly. As cybersecurity becomes a …

A systematic literature review and a conceptual framework proposition for advanced persistent threats (APT) detection for mobile devices using artificial intelligence …

AA Al-Kadhimi, MM Singh, MNA Khalid - Applied Sciences, 2023 - mdpi.com
Advanced persistent threat (APT) refers to a specific form of targeted attack used by a well-
organized and skilled adversary to remain undetected while systematically and continuously …