Toward proactive, adaptive defense: A survey on moving target defense

JH Cho, DP Sharma, H Alavizadeh… - … Surveys & Tutorials, 2020 - ieeexplore.ieee.org
Reactive defense mechanisms, such as intrusion detection systems, have made significant
efforts to secure a system or network for the last several decades. However, the nature of …

A survey of defensive deception: Approaches using game theory and machine learning

M Zhu, AH Anwar, Z Wan, JH Cho… - … Surveys & Tutorials, 2021 - ieeexplore.ieee.org
Defensive deception is a promising approach for cyber defense. Via defensive deception, a
defender can anticipate and prevent attacks by misleading or luring an attacker, or hiding …

Optimal privacy preservation strategies with signaling Q-learning for edge-computing-based IoT resource grant systems

S Shen, X Wu, P Sun, H Zhou, Z Wu, S Yu - Expert Systems with …, 2023 - Elsevier
Data privacy leakage can be severe when a malicious Internet of Things (IoT) node sends
requests to gather private data from an edge-computing-based IoT cloud storage system …

Harnessing artificial intelligence capabilities to improve cybersecurity

S Zeadally, E Adi, Z Baig, IA Khan - Ieee Access, 2020 - ieeexplore.ieee.org
Cybersecurity is a fast-evolving discipline that is always in the news over the last decade, as
the number of threats rises and cybercriminals constantly endeavor to stay a step ahead of …

Reinforcement learning for feedback-enabled cyber resilience

Y Huang, L Huang, Q Zhu - Annual reviews in control, 2022 - Elsevier
The rapid growth in the number of devices and their connectivity has enlarged the attack
surface and made cyber systems more vulnerable. As attackers become increasingly …

Wireless networked multirobot systems in smart factories

KC Chen, SC Lin, JH Hsiao, CH Liu… - Proceedings of the …, 2020 - ieeexplore.ieee.org
Smart manufacturing based on artificial intelligence and information communication
technology will become the main contributor to the digital economy of the upcoming …

A dynamic games approach to proactive defense strategies against advanced persistent threats in cyber-physical systems

L Huang, Q Zhu - Computers & Security, 2020 - Elsevier
Abstract Advanced Persistent Threats (APTs) have recently emerged as a significant security
challenge for a cyber-physical system due to their stealthy, dynamic and adaptive nature …

Three decades of deception techniques in active cyber defense-retrospect and outlook

L Zhang, VLL Thing - Computers & Security, 2021 - Elsevier
Deception techniques have been widely seen as a game changer in cyber defense. In this
paper, we review representative techniques in honeypots, honeytokens, and moving target …

A survey: When moving target defense meets game theory

J Tan, H **, H Zhang, Y Zhang, D Chang, X Liu… - Computer Science …, 2023 - Elsevier
Moving target defense (MTD) can break through asymmetry between attackers and
defenders. To improve the effectiveness of cybersecurity defense techniques, defense …

[HTML][HTML] A comprehensive survey on cyber deception techniques to improve honeypot performance

A Javadpour, F Ja'fari, T Taleb, M Shojafar… - Computers & …, 2024 - Elsevier
Honeypot technologies are becoming increasingly popular in cybersecurity as they offer
valuable insights into adversary behavior with a low rate of false detections. By diverting the …