Toward proactive, adaptive defense: A survey on moving target defense
Reactive defense mechanisms, such as intrusion detection systems, have made significant
efforts to secure a system or network for the last several decades. However, the nature of …
efforts to secure a system or network for the last several decades. However, the nature of …
A survey of defensive deception: Approaches using game theory and machine learning
Defensive deception is a promising approach for cyber defense. Via defensive deception, a
defender can anticipate and prevent attacks by misleading or luring an attacker, or hiding …
defender can anticipate and prevent attacks by misleading or luring an attacker, or hiding …
Optimal privacy preservation strategies with signaling Q-learning for edge-computing-based IoT resource grant systems
S Shen, X Wu, P Sun, H Zhou, Z Wu, S Yu - Expert Systems with …, 2023 - Elsevier
Data privacy leakage can be severe when a malicious Internet of Things (IoT) node sends
requests to gather private data from an edge-computing-based IoT cloud storage system …
requests to gather private data from an edge-computing-based IoT cloud storage system …
Harnessing artificial intelligence capabilities to improve cybersecurity
Cybersecurity is a fast-evolving discipline that is always in the news over the last decade, as
the number of threats rises and cybercriminals constantly endeavor to stay a step ahead of …
the number of threats rises and cybercriminals constantly endeavor to stay a step ahead of …
Reinforcement learning for feedback-enabled cyber resilience
The rapid growth in the number of devices and their connectivity has enlarged the attack
surface and made cyber systems more vulnerable. As attackers become increasingly …
surface and made cyber systems more vulnerable. As attackers become increasingly …
Wireless networked multirobot systems in smart factories
Smart manufacturing based on artificial intelligence and information communication
technology will become the main contributor to the digital economy of the upcoming …
technology will become the main contributor to the digital economy of the upcoming …
A dynamic games approach to proactive defense strategies against advanced persistent threats in cyber-physical systems
Abstract Advanced Persistent Threats (APTs) have recently emerged as a significant security
challenge for a cyber-physical system due to their stealthy, dynamic and adaptive nature …
challenge for a cyber-physical system due to their stealthy, dynamic and adaptive nature …
Three decades of deception techniques in active cyber defense-retrospect and outlook
L Zhang, VLL Thing - Computers & Security, 2021 - Elsevier
Deception techniques have been widely seen as a game changer in cyber defense. In this
paper, we review representative techniques in honeypots, honeytokens, and moving target …
paper, we review representative techniques in honeypots, honeytokens, and moving target …
A survey: When moving target defense meets game theory
J Tan, H **, H Zhang, Y Zhang, D Chang, X Liu… - Computer Science …, 2023 - Elsevier
Moving target defense (MTD) can break through asymmetry between attackers and
defenders. To improve the effectiveness of cybersecurity defense techniques, defense …
defenders. To improve the effectiveness of cybersecurity defense techniques, defense …
[HTML][HTML] A comprehensive survey on cyber deception techniques to improve honeypot performance
Honeypot technologies are becoming increasingly popular in cybersecurity as they offer
valuable insights into adversary behavior with a low rate of false detections. By diverting the …
valuable insights into adversary behavior with a low rate of false detections. By diverting the …