2023
DOI: 10.1016/j.dss.2022.113912
|View full text |Cite
|
Sign up to set email alerts
|

Security defense against long-term and stealthy cyberattacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 48 publications
0
2
0
Order By: Relevance
“…Second, we evaluate obtained strategies on an emulated IT infrastructure. This contrasts with most of the prior works that use game-theoretic approaches, which either evaluate strategies analytically or in simulation [8], [11], [57], [58], [74]- [76], [79], [81], [120]- [132], [161].…”
Section: A Game-theoretic Modeling In Network Securitymentioning
confidence: 89%
See 1 more Smart Citation
“…Second, we evaluate obtained strategies on an emulated IT infrastructure. This contrasts with most of the prior works that use game-theoretic approaches, which either evaluate strategies analytically or in simulation [8], [11], [57], [58], [74]- [76], [79], [81], [120]- [132], [161].…”
Section: A Game-theoretic Modeling In Network Securitymentioning
confidence: 89%
“…The game is modeled in different ways depending on the use case. Examples from the literature include: advanced persistent threat games [57], [74]- [76], [121], [122], [161], honeypot placement games [125]- [127], resource allocation games [41], [162], authentication games [8], distributed denial-of-service games [128], [133], situational awareness games [163], [164], moving target defense games [120], [165], jamming games [81], and intrusion response games [11], [31], [48], [53], [58], [79], [80], [124], [129]- [132], [134]. These games are formulated using various models from the game-theoretic literature.…”
Section: A Game-theoretic Modeling In Network Securitymentioning
confidence: 99%
“…Second, we evaluate obtained strategies on an emulated IT infrastructure. This contrasts with most of the prior works that use game-theoretic approaches, which either evaluate strategies analytically or in simulation [8], [10], [54], [66]- [68], [71], [72], [107]- [119], [150].…”
Section: A Game-theoretic Modeling In Network Securitymentioning
confidence: 91%
“…The game is modeled in different ways depending on the use case. Examples from the literature include: advanced persistent threat games [54], [66]- [68], [71], [108], [109], [150], honeypot placement games [112]- [114], resource allocation games [38], [151], authentication games [8], distributed denial-of-service games [115], [120], situational awareness games [152], [153], moving target defense games [107], [154], and intrusion response games [10], [28], [45], [50], [72], [111], [116]- [119], [121]. These games are formulated using various models from the gametheoretic literature.…”
Section: A Game-theoretic Modeling In Network Securitymentioning
confidence: 99%