A survey of moving target defenses for network security
Network defenses based on traditional tools, techniques, and procedures (TTP) fail to
account for the attacker's inherent advantage present due to the static nature of network …
account for the attacker's inherent advantage present due to the static nature of network …
A survey: When moving target defense meets game theory
J Tan, H **, H Zhang, Y Zhang, D Chang, X Liu… - Computer Science …, 2023 - Elsevier
Moving target defense (MTD) can break through asymmetry between attackers and
defenders. To improve the effectiveness of cybersecurity defense techniques, defense …
defenders. To improve the effectiveness of cybersecurity defense techniques, defense …
Flash boys 2.0: Frontrunning in decentralized exchanges, miner extractable value, and consensus instability
Blockchains, and specifically smart contracts, have promised to create fair and transparent
trading ecosystems. Unfortunately, we show that this promise has not been met. We …
trading ecosystems. Unfortunately, we show that this promise has not been met. We …
Flash boys 2.0: Frontrunning, transaction reordering, and consensus instability in decentralized exchanges
Blockchains, and specifically smart contracts, have promised to create fair and transparent
trading ecosystems. Unfortunately, we show that this promise has not been met. We …
trading ecosystems. Unfortunately, we show that this promise has not been met. We …
A dynamic games approach to proactive defense strategies against advanced persistent threats in cyber-physical systems
Abstract Advanced Persistent Threats (APTs) have recently emerged as a significant security
challenge for a cyber-physical system due to their stealthy, dynamic and adaptive nature …
challenge for a cyber-physical system due to their stealthy, dynamic and adaptive nature …
Dynamic defense strategy against advanced persistent threat with insiders
The landscape of cyber security has been reformed dramatically by the recently emerging
Advanced Persistent Threat (APT). It is uniquely featured by the stealthy, continuous …
Advanced Persistent Threat (APT). It is uniquely featured by the stealthy, continuous …
Exploration of mobile device behavior for mitigating advanced persistent threats (APT): a systematic literature review and conceptual framework
During the last several years, the Internet of Things (IoT), fog computing, computer security,
and cyber-attacks have all grown rapidly on a large scale. Examples of IoT include mobile …
and cyber-attacks have all grown rapidly on a large scale. Examples of IoT include mobile …
Effective repair strategy against advanced persistent threat: A differential game approach
Advanced persistent threat (APT) is a new kind of cyberattack that poses a serious threat to
modern society. When an APT campaign on an organization has been identified, the …
modern society. When an APT campaign on an organization has been identified, the …
Defending against advanced persistent threats using game-theory
Advanced persistent threats (APT) combine a variety of different attack forms ranging from
social engineering to technical exploits. The diversity and usual stealthiness of APT turns …
social engineering to technical exploits. The diversity and usual stealthiness of APT turns …
[LIBRO][B] Game theory for cyber deception
Interactions both online and in the emerging Internet of things (IoT) feature distributed
agents with local decision-making capabilities and misaligned incentives. This has …
agents with local decision-making capabilities and misaligned incentives. This has …