A Dynamic Games Approach to Proactive Defense Strategies against Advanced Persistent Threats in Cyber-Physical Systems
暂无分享,去创建一个
[1] Hongbo Zhu,et al. Deceptive Attack and Defense Game in Honeypot-Enabled Networks for the Internet of Things , 2016, IEEE Internet of Things Journal.
[2] Wei Gao,et al. Industrial Control System Cyber Attacks , 2013, ICS-CSR.
[3] Shanton Chang,et al. Information Leakage through Online Social Networking: Opening the Doorway for Advanced Persistence Threats , 2010, AISM 2010.
[4] Alvaro A. Cárdenas,et al. Resilience of Process Control Systems to Cyber-Physical Attacks , 2013, NordSec.
[5] Quanyan Zhu,et al. Game theory meets network security and privacy , 2013, CSUR.
[6] Yuan Yan Tang,et al. Defending against the Advanced Persistent Threat: An Optimal Control Approach , 2018, Secur. Commun. Networks.
[7] Quanyan Zhu,et al. Adaptive Honeypot Engagement through Reinforcement Learning of Semi-Markov Decision Processes , 2019, GameSec.
[8] Ming Zhang,et al. A Game Theoretic Model for Defending Against Stealthy Attacks with Limited Resources , 2015, GameSec.
[9] Michele Colajanni,et al. Analysis of high volumes of network traffic for Advanced Persistent Threat detection , 2016, Comput. Networks.
[10] Stefan Rass,et al. Defending Against Advanced Persistent Threats Using Game-Theory , 2017, PloS one.
[11] Johan Löfberg,et al. YALMIP : a toolbox for modeling and optimization in MATLAB , 2004 .
[12] Mohieddine Jelali,et al. Revision of the Tennessee Eastman Process Model , 2015 .
[13] Branislav Bosanský,et al. Manipulating Adversary's Belief: A Dynamic Game Approach to Deception by Design for Proactive Network Security , 2017, GameSec.
[14] Quanyan Zhu,et al. Adaptive Strategic Cyber Defense for Advanced Persistent Threats in Critical Infrastructure Networks , 2018, PERV.
[15] Wanlei Zhou,et al. Effective Repair Strategy Against Advanced Persistent Threat: A Differential Game Approach , 2019, IEEE Transactions on Information Forensics and Security.
[16] Quanyan Zhu,et al. A Large-Scale Markov Game Approach to Dynamic Protection of Interdependent Infrastructure Networks , 2017, GameSec.
[17] Wei Wang,et al. A Context-Based Detection Framework for Advanced Persistent Threats , 2012, 2012 International Conference on Cyber Security.
[18] Quanyan Zhu,et al. iSTRICT: An Interdependent Strategic Trust Mechanism for the Cloud-Enabled Internet of Controlled Things , 2018, IEEE Transactions on Information Forensics and Security.
[19] Frank Kargl,et al. Detection of APT Malware through External and Internal Network Traffic Correlation , 2015 .
[20] Mohamed Wahbi,et al. Advanced Persistent Threat: New analysis driven by life cycle phases and their challenges , 2016, 2016 International Conference on Advanced Communication Systems and Information Security (ACOSIS).
[21] Nikolaos V. Sahinidis,et al. A polyhedral branch-and-cut approach to global optimization , 2005, Math. Program..
[22] Neil C. Rowe,et al. Defending Cyberspace with Fake Honeypots , 2007, J. Comput..
[23] Yuval Elovici,et al. Detection of malicious PDF files and directions for enhancements: A state-of-the art survey , 2015, Comput. Secur..
[24] Florian Skopik,et al. Combating advanced persistent threats: From network event correlation to incident detection , 2015, Comput. Secur..
[25] Sangarapillai Lambotharan,et al. Hidden Markov Models and Alert Correlations for the Prediction of Advanced Persistent Threats , 2019, IEEE Access.
[26] Alvaro A. Cárdenas,et al. Attacks against process control systems: risk assessment, detection, and response , 2011, ASIACCS '11.
[27] John C. Harsanyi,et al. Games with Incomplete Information Played by "Bayesian" Players, I-III: Part I. The Basic Model& , 2004, Manag. Sci..
[28] Mehdi Kharrazi,et al. A composite-metric based path selection technique for the Tor anonymity network , 2015, J. Syst. Softw..
[29] Quanyan Zhu,et al. Analysis and Computation of Adaptive Defense Strategies Against Advanced Persistent Threats for Cyber-Physical Systems , 2018, GameSec.
[30] Quanyan Zhu,et al. A Game-theoretic Taxonomy and Survey of Defensive Deception for Cybersecurity and Privacy , 2017, ACM Comput. Surv..
[31] Ping Chen,et al. A Study on Advanced Persistent Threats , 2014, Communications and Multimedia Security.
[32] Johan Sigholm,et al. Towards Offensive Cyber Counterintelligence: Adopting a Target-Centric View on Advanced Persistent Threats , 2013, 2013 European Intelligence and Security Informatics Conference.
[33] Prasant Mohapatra,et al. Stealthy attacks meets insider threats: A three-player game model , 2015, MILCOM 2015 - 2015 IEEE Military Communications Conference.
[34] William L. Simon,et al. The Art of Deception: Controlling the Human Element of Security , 2001 .
[35] Alberto Leon-Garcia,et al. Communication Networks , 2000 .
[36] Quanyan Zhu,et al. On Multi-Phase and Multi-Stage Game-Theoretic Modeling of Advanced Persistent Threats , 2018, IEEE Access.
[37] Ronald L. Rivest,et al. FlipIt: The Game of “Stealthy Takeover” , 2012, Journal of Cryptology.
[38] Mohammad Hammoudeh,et al. Malicious SSL Certificate Detection: A Step Towards Advanced Persistent Threat Defence , 2017, ICFNDS.
[39] Khaled M. Rabie,et al. Detection of advanced persistent threat using machine-learning correlation analysis , 2018, Future Gener. Comput. Syst..
[40] Yoav Shoham,et al. Multiagent Systems - Algorithmic, Game-Theoretic, and Logical Foundations , 2009 .
[41] N. Lawrence Ricker,et al. Decentralized control of the Tennessee Eastman Challenge Process , 1996 .