Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
[HTML][HTML] Respite for SMEs: A systematic review of socio-technical cybersecurity metrics
Featured Application The results of this work will be incorporated in an application for SMEs
in Europe, which aims to improve cybersecurity awareness and resilience, as part of the EU …
in Europe, which aims to improve cybersecurity awareness and resilience, as part of the EU …
Fog computing systems: State of the art, research issues and future trends, with a focus on resilience
Many future innovative computing services will use Fog Computing Systems (FCS),
integrated with Internet of Things (IoT) resources. These new services, built on the …
integrated with Internet of Things (IoT) resources. These new services, built on the …
Deceptive reinforcement learning under adversarial manipulations on cost signals
This paper studies reinforcement learning (RL) under malicious falsification on cost signals
and introduces a quantitative framework of attack models to understand the vulnerabilities of …
and introduces a quantitative framework of attack models to understand the vulnerabilities of …
[PDF][PDF] Dynamic games for secure and resilient control system design
Modern control systems are featured by their hierarchical structure composed of cyber,
physical and human layers. The intricate dependencies among multiple layers and units of …
physical and human layers. The intricate dependencies among multiple layers and units of …
Recent developments in game-theory approaches for the detection and defense against advanced persistent threats (APTs): a systematic review
Cybersecurity has become a prominent issue in regard to ensuring information privacy and
integrity in the internet age particularly with the rise of interconnected devices. However …
integrity in the internet age particularly with the rise of interconnected devices. However …
Dynamic bayesian games for adversarial and defensive cyber deception
Security challenges accompany the efficiency. The pervasive integration of information and
communications technologies (ICTs) makes cyber-physical systems vulnerable to targeted …
communications technologies (ICTs) makes cyber-physical systems vulnerable to targeted …
Symbiotic game and foundation models for cyber deception operations in strategic cyber warfare
We are currently facing unprecedented cyber warfare with the rapid evolution of tactics,
increasing asymmetry of intelligence, and the growing accessibility of hacking tools. In this …
increasing asymmetry of intelligence, and the growing accessibility of hacking tools. In this …
A survey of optimization models and methods for cyberinfrastructure security
Critical infrastructure from a cross-section of sectors has become increasingly reliant on
cyber systems and cyberinfrastructure. Increasing risks to these cyber components …
cyber systems and cyberinfrastructure. Increasing risks to these cyber components …
Game theory meets network security: A tutorial
The increasingly pervasive connectivity of today's information systems brings up new
challenges to security. Traditional security has accomplished a long way toward protecting …
challenges to security. Traditional security has accomplished a long way toward protecting …
Optimal network defense strategy selection based on incomplete information evolutionary game
H Hu, Y Liu, H Zhang, R Pan - IEEE Access, 2018 - ieeexplore.ieee.org
The issue of selecting the optimal defense strategy in the dynamic adversarial network is
difficult. To solve this problem, we start from the realistic bounded rationality of both the …
difficult. To solve this problem, we start from the realistic bounded rationality of both the …