[HTML][HTML] Respite for SMEs: A systematic review of socio-technical cybersecurity metrics

M Van Haastrecht, B Yigit Ozkan, M Brinkhuis… - Applied sciences, 2021 - mdpi.com
Featured Application The results of this work will be incorporated in an application for SMEs
in Europe, which aims to improve cybersecurity awareness and resilience, as part of the EU …

Fog computing systems: State of the art, research issues and future trends, with a focus on resilience

J Moura, D Hutchison - Journal of Network and Computer Applications, 2020 - Elsevier
Many future innovative computing services will use Fog Computing Systems (FCS),
integrated with Internet of Things (IoT) resources. These new services, built on the …

Deceptive reinforcement learning under adversarial manipulations on cost signals

Y Huang, Q Zhu - Decision and Game Theory for Security: 10th …, 2019 - Springer
This paper studies reinforcement learning (RL) under malicious falsification on cost signals
and introduces a quantitative framework of attack models to understand the vulnerabilities of …

[PDF][PDF] Dynamic games for secure and resilient control system design

Y Huang, J Chen, L Huang, Q Zhu - National Science Review, 2020 - academic.oup.com
Modern control systems are featured by their hierarchical structure composed of cyber,
physical and human layers. The intricate dependencies among multiple layers and units of …

Recent developments in game-theory approaches for the detection and defense against advanced persistent threats (APTs): a systematic review

MNA Khalid, AA Al-Kadhimi, MM Singh - Mathematics, 2023 - mdpi.com
Cybersecurity has become a prominent issue in regard to ensuring information privacy and
integrity in the internet age particularly with the rise of interconnected devices. However …

Dynamic bayesian games for adversarial and defensive cyber deception

L Huang, Q Zhu - … Cyber Deception: Reasoning, Adaptive Planning, and …, 2019 - Springer
Security challenges accompany the efficiency. The pervasive integration of information and
communications technologies (ICTs) makes cyber-physical systems vulnerable to targeted …

Symbiotic game and foundation models for cyber deception operations in strategic cyber warfare

T Li, Q Zhu - arxiv preprint arxiv:2403.10570, 2024 - arxiv.org
We are currently facing unprecedented cyber warfare with the rapid evolution of tactics,
increasing asymmetry of intelligence, and the growing accessibility of hacking tools. In this …

A survey of optimization models and methods for cyberinfrastructure security

F Enayaty-Ahangar, LA Albert, E DuBois - IISE Transactions, 2020 - Taylor & Francis
Critical infrastructure from a cross-section of sectors has become increasingly reliant on
cyber systems and cyberinfrastructure. Increasing risks to these cyber components …

Game theory meets network security: A tutorial

Q Zhu, S Rass - Proceedings of the 2018 ACM SIGSAC conference on …, 2018 - dl.acm.org
The increasingly pervasive connectivity of today's information systems brings up new
challenges to security. Traditional security has accomplished a long way toward protecting …

Optimal network defense strategy selection based on incomplete information evolutionary game

H Hu, Y Liu, H Zhang, R Pan - IEEE Access, 2018 - ieeexplore.ieee.org
The issue of selecting the optimal defense strategy in the dynamic adversarial network is
difficult. To solve this problem, we start from the realistic bounded rationality of both the …