Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A survey of moving target defenses for network security
Network defenses based on traditional tools, techniques, and procedures (TTP) fail to
account for the attacker's inherent advantage present due to the static nature of network …
account for the attacker's inherent advantage present due to the static nature of network …
A survey: When moving target defense meets game theory
J Tan, H **, H Zhang, Y Zhang, D Chang, X Liu… - Computer Science …, 2023 - Elsevier
Moving target defense (MTD) can break through asymmetry between attackers and
defenders. To improve the effectiveness of cybersecurity defense techniques, defense …
defenders. To improve the effectiveness of cybersecurity defense techniques, defense …
Optimal strategy selection for moving target defense based on Markov game
With the evolution of the research on network moving target defense (MTD), the selection of
optimal strategy has become one of the key problems in current research. Directed to the …
optimal strategy has become one of the key problems in current research. Directed to the …
Resource-aware detection and defense system against multi-type attacks in the cloud: Repeated bayesian stackelberg game
Cloud-based systems are subject to various attack types launched by Virtual Machines
(VMs) manipulated by attackers having different goals and skills. The existing detection and …
(VMs) manipulated by attackers having different goals and skills. The existing detection and …
Multi-agent reinforcement learning in bayesian stackelberg markov games for adaptive moving target defense
The field of cybersecurity has mostly been a cat-and-mouse game with the discovery of new
attacks leading the way. To take away an attacker's advantage of reconnaissance …
attacks leading the way. To take away an attacker's advantage of reconnaissance …
: A Game-Theoretic Cyber Insurance Framework for Incentive-Compatible Cyber Risk Management of Internet of Things
Internet of Things (IoT) is highly vulnerable to emerging Advanced Persistent Threats (APTs)
that are often operated by well-resourced adversaries. Achieving perfect security for IoT …
that are often operated by well-resourced adversaries. Achieving perfect security for IoT …
A network coding and DES based dynamic encryption scheme for moving target defense
Unlike prior efforts in cybersecurity research, a dynamic defense theory, called moving target
defense, increases the complexity and costs for attacks by effectively restricting the …
defense, increases the complexity and costs for attacks by effectively restricting the …
[PDF][PDF] A game theoretic approach to strategy generation for moving target defense in web applications
The present complexity in designing web applications makes software security a difficult
goal to achieve. An attacker can explore a deployed service on the web and attack at his/her …
goal to achieve. An attacker can explore a deployed service on the web and attack at his/her …
Protecting the internet of vehicles against advanced persistent threats: A Bayesian Stackelberg game
Connected vehicles are essential for the deployment of intelligent transportation services.
However, the high level of connectivity in today's Internet of vehicles (IoV) and the extreme …
However, the high level of connectivity in today's Internet of vehicles (IoV) and the extreme …
SDN based scalable MTD solution in cloud network
Software-Defined Networking (SDN) has emerged as a framework for centralized command
and control in cloud data centric environments. SDN separates data and control plane …
and control in cloud data centric environments. SDN separates data and control plane …