Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Foundations and applications of artificial Intelligence for zero-day and multi-step attack detection
Behind firewalls, more and more cybersecurity attacks are specifically targeted to the very
network where they are taking place. This review proposes a comprehensive framework for …
network where they are taking place. This review proposes a comprehensive framework for …
From physical security to cybersecurity
Security is a critical concern around the world. In many domains from cybersecurity to
sustainability, limited security resources prevent complete security coverage at all times …
sustainability, limited security resources prevent complete security coverage at all times …
Honeypot allocation for cyber deception under uncertainty
Cyber deception aims to misrepresent the state of the network to mislead the attackers,
falsify their reconnaissance conclusions, and deflect them away from their goals. Honeypots …
falsify their reconnaissance conclusions, and deflect them away from their goals. Honeypots …
Solving partially observable stochastic games with public observations
In many real-world problems, there is a dynamic interaction between competitive agents.
Partially observable stochastic games (POSGs) are among the most general formal models …
Partially observable stochastic games (POSGs) are among the most general formal models …
[PDF][PDF] Trends and applications in Stackelberg security games
Security is a critical concern around the world, whether it is the challenge of protecting ports,
airports and other critical infrastructure, interdicting the illegal flow of drugs, weapons and …
airports and other critical infrastructure, interdicting the illegal flow of drugs, weapons and …
Optimizing honeypot strategies against dynamic lateral movement using partially observable stochastic games
Partially observable stochastic games (POSGs) are a general game-theoretic model for
capturing dynamic interactions where players have partial information. The existing …
capturing dynamic interactions where players have partial information. The existing …
Heuristic search value iteration for one-sided partially observable stochastic games
Security problems can be modeled as two-player partially observable stochastic games with
one-sided partial observability and infinite horizon (one-sided POSGs). We seek for optimal …
one-sided partial observability and infinite horizon (one-sided POSGs). We seek for optimal …
Learning near-optimal intrusion responses against dynamic attackers
We study automated intrusion response and formulate the interaction between an attacker
and a defender as an optimal stop** game where attack and defense strategies evolve …
and a defender as an optimal stop** game where attack and defense strategies evolve …
Game theoretic approaches to attack surface shifting
A software system's attack surface is the set of ways in which the system can be attacked. In
our prior work, we introduced an attack surface measurement and reduction method to …
our prior work, we introduced an attack surface measurement and reduction method to …
[PDF][PDF] Security scheduling for real-world networks
Network based security games, where a defender strategically places security measures on
the edges of a graph to protect against an adversary, who chooses a path through a graph is …
the edges of a graph to protect against an adversary, who chooses a path through a graph is …