Survey of attack projection, prediction, and forecasting in cyber security
This paper provides a survey of prediction, and forecasting methods used in cyber security.
Four main tasks are discussed first, attack projection and intention recognition, in which …
Four main tasks are discussed first, attack projection and intention recognition, in which …
Survey of contemporary open-source honeypots, frameworks, and tools
Automated attacks allow adversaries to exploit vulnerabilities in enterprise IT systems at
short notice. To identify such attacks as well as new cyber security threats, defenders use …
short notice. To identify such attacks as well as new cyber security threats, defenders use …
ClockIDS: A real-time vehicle intrusion detection system based on clock skew
Although intelligent connected vehicles (ICVs) can better assist drivers and improve their
driving experience, they have huge network security problems and are frequently attacked …
driving experience, they have huge network security problems and are frequently attacked …
Hidden markov model and cyber deception for the prevention of adversarial lateral movement
Advanced persistent threats (APTs) have emerged as multi-stage attacks that have targeted
nation-states and their associated entities, including private and corporate sectors. Cyber …
nation-states and their associated entities, including private and corporate sectors. Cyber …
A probabilistic logic of cyber deception
Malicious attackers often scan nodes in a network in order to identify vulnerabilities that they
may exploit as they traverse the network. In this paper, we propose that the system …
may exploit as they traverse the network. In this paper, we propose that the system …
Performance modeling of moving target defenses with reconfiguration limits
Moving Target Defense (MTD) has recently emerged as a game changer in the security
landscape due to its proven potential to introduce asymmetric uncertainty that gives the …
landscape due to its proven potential to introduce asymmetric uncertainty that gives the …
Dolos: A novel architecture for moving target defense
Moving Target Defense and Cyber Deception emerged in recent years as two key proactive
cyber defense approaches, contrasting with the static nature of the traditional reactive cyber …
cyber defense approaches, contrasting with the static nature of the traditional reactive cyber …
A survey on moving target defense for networks: A practical view
The static nature of many of currently used network systems has multiple practical benefits,
including cost optimization and ease of deployment, but it makes them vulnerable to …
including cost optimization and ease of deployment, but it makes them vulnerable to …
Toward the adoption of secure cyber digital twins to enhance cyber-physical systems security
Abstract Cyber-Physical Systems (CPSs) and Digital Twins (DTs) currently represent the two
most notable examples of cyber-physical integration enabled by modern ICT technologies …
most notable examples of cyber-physical integration enabled by modern ICT technologies …
Performance modeling of moving target defenses
In recent years, Moving Target Defense (MTD) has emerged as a potential game changer in
the security landscape, due to its potential to create asymmetric uncertainty that favors the …
the security landscape, due to its potential to create asymmetric uncertainty that favors the …