A survey: When moving target defense meets game theory
J Tan, H **, H Zhang, Y Zhang, D Chang, X Liu… - Computer Science …, 2023 - Elsevier
Moving target defense (MTD) can break through asymmetry between attackers and
defenders. To improve the effectiveness of cybersecurity defense techniques, defense …
defenders. To improve the effectiveness of cybersecurity defense techniques, defense …
Anomaly detection with graph convolutional networks for insider threat and fraud detection
J Jiang, J Chen, T Gu, KKR Choo, C Liu… - MILCOM 2019-2019 …, 2019 - ieeexplore.ieee.org
Anomaly detection generally involves the extraction of features from entities' or users'
properties, and the design of anomaly detection models using machine learning or deep …
properties, and the design of anomaly detection models using machine learning or deep …
Machine learning approaches to detect, prevent and mitigate malicious insider threats: State-of-the-art review
Insider threats are profoundly damaging and pose serious security challenges. These
threats, perpetrated by insiders, may arise from delinquency, retaliation, or motives such as …
threats, perpetrated by insiders, may arise from delinquency, retaliation, or motives such as …
Effective repair strategy against advanced persistent threat: A differential game approach
Advanced persistent threat (APT) is a new kind of cyberattack that poses a serious threat to
modern society. When an APT campaign on an organization has been identified, the …
modern society. When an APT campaign on an organization has been identified, the …
A high accuracy and adaptive anomaly detection model with dual-domain graph convolutional network for insider threat detection
X Li, X Li, J Jia, L Li, J Yuan, Y Gao… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Insider threat is destructive and concealable, making addressing it a challenging task in
cybersecurity. Most existing methods transform user behavior into sequential information …
cybersecurity. Most existing methods transform user behavior into sequential information …
A risk management approach to defending against the advanced persistent threat
The advanced persistent threat (APT) as a new kind of cyber attack has posed a severe
threat to modern organizations. When the APT has been detected, the organization has to …
threat to modern organizations. When the APT has been detected, the organization has to …
Defense against advanced persistent threat through data backup and recovery
Advanced persistent threat (APT) as a generic highly sophisticated cyber attack poses a
severe threat to organizational data security. Since the conventional detection and repair …
severe threat to organizational data security. Since the conventional detection and repair …
FlipIt game model-based defense strategy against cyberattacks on SCADA systems considering insider assistance
Z Liu, L Wang - IEEE Transactions on Information Forensics …, 2021 - ieeexplore.ieee.org
The industrial internet of things (IIoT) is emerging as a global trend to dramatically enhance
the intelligence and efficiency of the industries in recent years. With the emphasis on data …
the intelligence and efficiency of the industries in recent years. With the emphasis on data …
[HTML][HTML] The evolution of the flip-it game in cybersecurity: Insights from the past to the future
Cybercrime statistics highlight the severe and growing impact of digital threats on individuals
and organizations, with financial losses escalating rapidly. As cybersecurity becomes a …
and organizations, with financial losses escalating rapidly. As cybersecurity becomes a …
A systematic literature review and a conceptual framework proposition for advanced persistent threats (APT) detection for mobile devices using artificial intelligence …
Advanced persistent threat (APT) refers to a specific form of targeted attack used by a well-
organized and skilled adversary to remain undetected while systematically and continuously …
organized and skilled adversary to remain undetected while systematically and continuously …