Optimal Cyber-Defense Strategies for Advanced Persistent Threats: A Game Theoretical Analysis
暂无分享,去创建一个
Tom LaPorta | Jeffrey Acquaviva | Mark Mahon | Bruce Einfalt | T. LaPorta | Mark Mahon | Jeffrey Acquaviva | Bruce Einfalt
[1] Sushil Jajodia,et al. k-Zero Day Safety: Measuring the Security Risk of Networks against Unknown Attacks , 2010, ESORICS.
[2] Steven B. Lipner,et al. Trusted Computer System Evaluation Criteria ( Orange Book ) December , 2001 .
[3] Milind Tambe,et al. "A Game of Thrones": When Human Behavior Models Compete in Repeated Stackelberg Security Games , 2015, AAMAS.
[4] Sam Malek,et al. A Systematic Survey of Self-Protecting Software Systems , 2014, ACM Trans. Auton. Adapt. Syst..
[5] Mathias Ekstedt,et al. Empirical Analysis of System-Level Vulnerability Metrics through Actual Attacks , 2012, IEEE Transactions on Dependable and Secure Computing.
[6] S. Ross. The Exponential Distribution and the Poisson Process , 2014 .
[7] Gábor Horváth,et al. FlipThem: Modeling Targeted Attacks with FlipIt for Multiple Resources , 2014, GameSec.
[8] Hannes Holm. A Large-Scale Study of the Time Required to Compromise a Computer System , 2014, IEEE Transactions on Dependable and Secure Computing.
[9] Milind Tambe,et al. Security and Game Theory: IRIS – A Tool for Strategic Security Allocation in Transportation Networks , 2011, AAMAS 2011.
[10] Catriona Kennedy,et al. Distributed Metamanagement for Self-Protection and Self-Explanation , 2011, Metareasoning.
[11] Milind Tambe,et al. Optimal patrol strategy for protecting moving targets with multiple mobile resources , 2013, AAMAS.
[12] John McHugh,et al. Defending Yourself: The Role of Intrusion Detection Systems , 2000, IEEE Software.
[13] Sarit Kraus,et al. Deployed ARMOR protection: the application of a game theoretic model for security at the Los Angeles International Airport , 2008, AAMAS.
[14] Johnny S. Wong,et al. A Cost-Sensitive Model for Preemptive Intrusion Response Systems , 2007, 21st International Conference on Advanced Information Networking and Applications (AINA '07).
[15] Jeffrey O. Kephart,et al. The Vision of Autonomic Computing , 2003, Computer.
[16] Dong Seong Kim,et al. Attack countermeasure trees (ACT): towards unifying the constructs of attack and defense trees , 2012, Secur. Commun. Networks.
[17] Quanyan Zhu,et al. GADAPT: A Sequential Game-Theoretic Framework for Designing Defense-in-Depth Strategies Against Advanced Persistent Threats , 2016, GameSec.
[18] Gernot Heiser,et al. Last-Level Cache Side-Channel Attacks are Practical , 2015, 2015 IEEE Symposium on Security and Privacy.
[19] Markus Jakobsson,et al. Social phishing , 2007, CACM.
[20] Chase Qishi Wu,et al. A Survey of Game Theory as Applied to Network Security , 2010, 2010 43rd Hawaii International Conference on System Sciences.
[21] Khurram Shahzad,et al. P2CySeMoL: Predictive, Probabilistic Cyber Security Modeling Language , 2015, IEEE Trans. Dependable Secur. Comput..
[22] Arun K. Sood,et al. Closing cluster attack windows through server redundancy and rotations , 2006 .
[23] Ronald L. Rivest,et al. FlipIt: The Game of “Stealthy Takeover” , 2012, Journal of Cryptology.
[24] William Nzoukou,et al. A Unified Framework for Measuring a Network's Mean Time-to-Compromise , 2013, 2013 IEEE 32nd International Symposium on Reliable Distributed Systems.
[25] Antonios Atlasis,et al. Detecting DNS Tunneling , 2019 .
[26] Petr Jan Horn,et al. Autonomic Computing: IBM's Perspective on the State of Information Technology , 2001 .