نتایج جستجو برای: attacker

تعداد نتایج: 5419  

2017
Youzhi Zhang Bo An Long Tran-Thanh Zhen Wang Jiarui Gan Nicholas R. Jennings

Preventing crimes or terrorist attacks in urban areas is challenging. Law enforcement officers need to respond quickly to catch the attacker on his escape route, which is subject to time-dependent traffic conditions on transportation networks. The attacker can strategically choose his escape path and driving speed to avoid being captured. Existing work on security resource allocation has not co...

2012
Xiaohui Cui Wade Gasior Justin M. Beaver Jim N. Treadwell

The ShadowNet infrastructure for insider cyber attack prevention is comprised of a tiered server system that is able to dynamically redirect dangerous/suspicious network traffic away from production servers that provide web, ftp, database and other vital services to cloned virtual machines in a quarantined environment. This is done transparently from the point of view of both the attacker and n...

Journal: :Psychonomic bulletin & review 2001
E M Reingold N Charness R S Schultetus D M Stampe

A check detection task in a 5 x 5 section of the chessboard, containing a King and one or two potential checking pieces was employed. The checking status (i.e., the presence or absence of a check) and the number of attackers (one or two) were manipulated. It was found that the reaction time cost for adding a distractor was differentially greater in no trials than yes trials for novice, but not ...

2017
Saqib Hasan Amin Ghafouri Abhishek Dubey Gabor Karsai Xenofon Koutsoukos

Reliable operation of power systems is a primary challenge for the system operators. With the advancement in technology and grid automation, power systems are becoming more vulnerable to cyber-attacks. The main goal of adversaries is to take advantage of these vulnerabilities and destabilize the system. This paper describes a game-theoretic approach to attacker / defender modeling in power syst...

Journal: :CoRR 2017
Jeffrey Pawlick Thi Thu Hang Nguyen Quanyan Zhu

Advanced persistent threats (APTs) are stealthy attacks which make use of social engineering and deception to give adversaries insider access to networked systems. Against APTs, active defense technologies aim to create and exploit information asymmetry for defenders. In this paper, we study a scenario in which a powerful defender uses honeynets for active defense in order to observe an attacke...

2006
Miles A. McQueen Wayne F. Boyer Mark A. Flynn George A. Beitel

We propose a new model for estimating the time to compromise a system component that is visible to an attacker. The model provides an estimate of the expected value of the time-to-compromise as a function of known and visible vulnerabilities, and attacker skill level. The time-to-compromise random process model is a composite of three subprocesses associated with attacker actions aimed at the e...

2013
Filipe Manuel Clemente Micael Santos Couceiro Fernando Manuel Lourenço Martins Gonçalo Dias Rui Mendes

The performance of football players within game context can be analyzed based on their ability to break or (re)balance the attacker-defender dyad. In this context, the analysis of each sub-phase (e.g., 1v1, 2v2) presents a feature that needs to be taken into account in sports analysis. This study aims to investigate the interpersonal dynamics dyad formed by the attacker and the defender in 1v1 ...

2015
A. Ben Yaghlane M. N. Azaiez M. Mrad

We investigate the large scale of networks in the context of network survivability under attack. We use appropriate techniques to evaluate and the attacker-basedand the defenderbased-network survivability. The attacker is unaware of the operated links by the defender. Each attacked link has some pre-specified probability to be disconnected. The defender choice is so that to maximize the chance ...

2003
William Weinstein Janet Lepanto

By monitoring Internet traffic in the vicinity of a given host—which can be a single computer or a gateway device with multiple computers behind it—an attacker can observe communications originating from and destined to this host. Even if the message contents are encrypted, the IP addresses must remain visible for the packets to be properly routed throughout the open Internet. So the attacker c...

2006
Miles A. McQueen Wayne F. Boyer Mark A. Flynn George A. Beitel

We propose a new model for estimating the time to compromise a system component that is visible to an attacker. The model provides an estimate of the expected value of the time-to-compromise as a function of known and visible vulnerabilities, and attacker skill level. The time-to-compromise random process model is a composite of three subprocesses associated with attacker actions aimed at the e...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید