Adversarial machine learning for network intrusion detection systems: A comprehensive survey
Network-based Intrusion Detection System (NIDS) forms the frontline defence against
network attacks that compromise the security of the data, systems, and networks. In recent …
network attacks that compromise the security of the data, systems, and networks. In recent …
Toward proactive, adaptive defense: A survey on moving target defense
Reactive defense mechanisms, such as intrusion detection systems, have made significant
efforts to secure a system or network for the last several decades. However, the nature of …
efforts to secure a system or network for the last several decades. However, the nature of …
The roadmap to 6G security and privacy
Although the fifth generation (5G) wireless networks are yet to be fully investigated, the
visionaries of the 6th generation (6G) echo systems have already come into the discussion …
visionaries of the 6th generation (6G) echo systems have already come into the discussion …
A survey on security threats and defensive techniques of machine learning: A data driven view
Machine learning is one of the most prevailing techniques in computer science, and it has
been widely applied in image processing, natural language processing, pattern recognition …
been widely applied in image processing, natural language processing, pattern recognition …
A survey of moving target defenses for network security
Network defenses based on traditional tools, techniques, and procedures (TTP) fail to
account for the attacker's inherent advantage present due to the static nature of network …
account for the attacker's inherent advantage present due to the static nature of network …
Three decades of deception techniques in active cyber defense-retrospect and outlook
L Zhang, VLL Thing - Computers & Security, 2021 - Elsevier
Deception techniques have been widely seen as a game changer in cyber defense. In this
paper, we review representative techniques in honeypots, honeytokens, and moving target …
paper, we review representative techniques in honeypots, honeytokens, and moving target …
A survey: When moving target defense meets game theory
J Tan, H **, H Zhang, Y Zhang, D Chang, X Liu… - Computer Science …, 2023 - Elsevier
Moving target defense (MTD) can break through asymmetry between attackers and
defenders. To improve the effectiveness of cybersecurity defense techniques, defense …
defenders. To improve the effectiveness of cybersecurity defense techniques, defense …
Leveraging computational intelligence techniques for defensive deception: a review, recent advances, open problems and future directions
With information systems worldwide being attacked daily, analogies from traditional warfare
are apt, and deception tactics have historically proven effective as both a strategy and a …
are apt, and deception tactics have historically proven effective as both a strategy and a …
Democratizing container live migration for enhanced future networks-a survey
Emerging cloud-centric networks span from edge clouds to large-scale datacenters with
shared infrastructure among multiple tenants and applications with high availability …
shared infrastructure among multiple tenants and applications with high availability …
The Hexa-X project vision on Artificial Intelligence and Machine Learning-driven Communication and Computation co-design for 6G
This paper provides an overview of the most recent advancements and outcomes of the
European 6G flagship project Hexa-X, on the topic of in-network Artificial Intelligence (AI) …
European 6G flagship project Hexa-X, on the topic of in-network Artificial Intelligence (AI) …