Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A survey: When moving target defense meets game theory
J Tan, H **, H Zhang, Y Zhang, D Chang, X Liu… - Computer Science …, 2023 - Elsevier
Moving target defense (MTD) can break through asymmetry between attackers and
defenders. To improve the effectiveness of cybersecurity defense techniques, defense …
defenders. To improve the effectiveness of cybersecurity defense techniques, defense …
[HTML][HTML] Software-Defined Networking approaches for intrusion response in Industrial Control Systems: A survey
Abstract Industrial Control Systems (ICSs) are a key technology for life-sustainability, social
development and economic progress used in a wide range of industrial solutions, including …
development and economic progress used in a wide range of industrial solutions, including …
A differential game approach for real-time security defense decision in scale-free networks
H Zhang, Y Mi, X Liu, Y Zhang, J Wang, J Tan - Computer Networks, 2023 - Elsevier
The current network security defense decision method is based on the principle of attack–
defense confrontation and generally uses a random network model to project the real …
defense confrontation and generally uses a random network model to project the real …
An SDN-enabled proactive defense framework for DDoS mitigation in IoT networks
The Internet of Things (IoT) is becoming truly ubiquitous in every domain of human lives, and
a large number of objects can be connected and enabled to communicate with cloud servers …
a large number of objects can be connected and enabled to communicate with cloud servers …
Scema: an sdn-oriented cost-effective edge-based mtd approach
Protecting large-scale networks, especially Software-Defined Networks (SDNs), against
distributed attacks in a cost-effective manner plays a prominent role in cybersecurity. One of …
distributed attacks in a cost-effective manner plays a prominent role in cybersecurity. One of …
A survey of link flooding attacks in software defined network ecosystems
Abstract Link Flooding Attacks (LFA) are a devastating type of stealthy denial of service
attack that congests critical network links and can completely isolate the victim's network. In …
attack that congests critical network links and can completely isolate the victim's network. In …
Learning near-optimal intrusion responses against dynamic attackers
We study automated intrusion response and formulate the interaction between an attacker
and a defender as an optimal stop** game where attack and defense strategies evolve …
and a defender as an optimal stop** game where attack and defense strategies evolve …
ReLFA: Resist link flooding attacks via renyi entropy and deep reinforcement learning in SDN-IoT
J Wang, Y Liu, W Zhang, X Yan, N Zhou… - China …, 2022 - ieeexplore.ieee.org
Link flooding attack (LFA) is a fresh distributed denial of service attack (DDoS). Attackers can
cut off the critical links, making the services in the target area unavailable. LFA manipulates …
cut off the critical links, making the services in the target area unavailable. LFA manipulates …
Defending against flooding attacks in the internet of drones environment
Even though drones are still in the infancy period in terms of widespread adoption and use,
they have already pierced through solid conventional barriers in various domains of …
they have already pierced through solid conventional barriers in various domains of …
A stackelberg game approach to the stability of networked switched systems under DoS attacks
This paper investigates the stability of networked switched systems under DoS attacks by a
Stackelberg game approach. Firstly, the non-cooperative competition between the attacker …
Stackelberg game approach. Firstly, the non-cooperative competition between the attacker …