On Detecting Manifestation of Adversary Characteristics
暂无分享,去创建一个
Rauf Izmailov | Shridatt Sugrim | Ritu Chadha | Cho-Yu Jason Chiang | Bharat Doshi | Norbou Buchler | E. Allison Newcomb | Sridhar Venkatesan | Blaine Hoffman
[1] Sushil Jajodia,et al. A Probabilistic Logic of Cyber Deception , 2017, IEEE Transactions on Information Forensics and Security.
[2] Phyllis A. Schneck,et al. Cybersecurity: From Months to Milliseconds , 2015, Computer.
[3] M Marvel Lisa,et al. CyberVAN: A Cyber Security Virtual Assured Network testbed , 2016 .
[4] Arvind Narayanan,et al. When Coding Style Survives Compilation: De-anonymizing Programmers from Executable Binaries , 2015, NDSS.
[5] William H. Sanders,et al. Adversary-driven state-based system security evaluation , 2010, MetriSec '10.
[6] Blake D. Bryant,et al. IEEE Transactions on Information Forensics and Security , 2018 .
[7] Ananthram Swami,et al. Malware traffic detection using tamper resistant features , 2015, MILCOM 2015 - 2015 IEEE Military Communications Conference.
[8] D M Faissol,et al. Taxonomies of Cyber Adversaries and Attacks: A Survey of Incidents and Approaches , 2009 .
[9] Arvind Narayanan,et al. De-anonymizing Programmers via Code Stylometry , 2015, USENIX Security Symposium.
[10] Sushil Jajodia,et al. Moving Target Defense - Creating Asymmetric Uncertainty for Cyber Threats , 2011, Moving Target Defense.
[11] William H. Sanders,et al. Characterizing the Behavior of Cyber Adversaries : The Means , Motive , and Opportunity of Cyberattacks , 2010 .
[12] Fabio Massacci,et al. The Work-Averse Attacker Model , 2015, ECIS.
[13] S. L. N. Hald,et al. An updated taxonomy for characterizing hackers according to their threat properties , 2012, 2012 14th International Conference on Advanced Communication Technology (ICACT).