A survey of moving target defenses for network security

S Sengupta, A Chowdhary, A Sabur… - … Surveys & Tutorials, 2020 - ieeexplore.ieee.org
Network defenses based on traditional tools, techniques, and procedures (TTP) fail to
account for the attacker's inherent advantage present due to the static nature of network …

A survey: When moving target defense meets game theory

J Tan, H **, H Zhang, Y Zhang, D Chang, X Liu… - Computer Science …, 2023 - Elsevier
Moving target defense (MTD) can break through asymmetry between attackers and
defenders. To improve the effectiveness of cybersecurity defense techniques, defense …

Flash boys 2.0: Frontrunning in decentralized exchanges, miner extractable value, and consensus instability

P Daian, S Goldfeder, T Kell, Y Li… - … IEEE symposium on …, 2020 - ieeexplore.ieee.org
Blockchains, and specifically smart contracts, have promised to create fair and transparent
trading ecosystems. Unfortunately, we show that this promise has not been met. We …

Flash boys 2.0: Frontrunning, transaction reordering, and consensus instability in decentralized exchanges

P Daian, S Goldfeder, T Kell, Y Li, X Zhao… - arxiv preprint arxiv …, 2019 - arxiv.org
Blockchains, and specifically smart contracts, have promised to create fair and transparent
trading ecosystems. Unfortunately, we show that this promise has not been met. We …

A dynamic games approach to proactive defense strategies against advanced persistent threats in cyber-physical systems

L Huang, Q Zhu - Computers & Security, 2020 - Elsevier
Abstract Advanced Persistent Threats (APTs) have recently emerged as a significant security
challenge for a cyber-physical system due to their stealthy, dynamic and adaptive nature …

Dynamic defense strategy against advanced persistent threat with insiders

P Hu, H Li, H Fu, D Cansever… - 2015 IEEE Conference …, 2015 - ieeexplore.ieee.org
The landscape of cyber security has been reformed dramatically by the recently emerging
Advanced Persistent Threat (APT). It is uniquely featured by the stealthy, continuous …

Exploration of mobile device behavior for mitigating advanced persistent threats (APT): a systematic literature review and conceptual framework

T Jabar, M Mahinderjit Singh - Sensors, 2022 - mdpi.com
During the last several years, the Internet of Things (IoT), fog computing, computer security,
and cyber-attacks have all grown rapidly on a large scale. Examples of IoT include mobile …

Effective repair strategy against advanced persistent threat: A differential game approach

LX Yang, P Li, Y Zhang, X Yang… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Advanced persistent threat (APT) is a new kind of cyberattack that poses a serious threat to
modern society. When an APT campaign on an organization has been identified, the …

Defending against advanced persistent threats using game-theory

S Rass, S König, S Schauer - PloS one, 2017 - journals.plos.org
Advanced persistent threats (APT) combine a variety of different attack forms ranging from
social engineering to technical exploits. The diversity and usual stealthiness of APT turns …

[LIBRO][B] Game theory for cyber deception

J Pawlick, Q Zhu - 2021 - Springer
Interactions both online and in the emerging Internet of things (IoT) feature distributed
agents with local decision-making capabilities and misaligned incentives. This has …