نتایج جستجو برای: cyber defense

تعداد نتایج: 91877  

Journal: :Computers & Security 2013
Kristin E. Heckman Michael J. Walsh Frank J. Stech Todd A. O'Boyle Stephen R. DiCato Audra F. Herber

In January 2012, MITRE performed a real-time, red team/blue team cyber-wargame experiment. This presented the opportunity to blend cyber-warfare with traditional mission planning and execution, including denial and deception tradecraft. The cyberwargame was designed to test a dynamic network defense cyber-security platform being researched in The MITRE Corporation’s Innovation Program called Bl...

2014
James Jones Kathryn B. Laskey

We present a method to devise, execute, and assess a cyber deception. The aim is to cause an adversary to believe they are under a cyber attack when in fact they are not. Cyber network defense relies on human and computational systems that can reason over multiple individual evidentiary items to detect the presence of meta events, i.e., cyber attacks. Many of these systems aggregate and reason ...

2016
Maochao Xu Lei Hua Shouhuai Xu

Internet-based computer information systems play critical roles in many aspects of the modern society. However, these systems are constantly under cyber attacks that can cause catastrophic consequences. In order to defend these systems effectively, it is necessary to measure and predict the effectiveness of cyber defense mechanisms. In this paper, we investigate how to measure and predict the e...

Journal: :CoRR 2017
Alan T. Sherman Melissa Dark Agnes Chan Rylan Chong Thomas Morris Linda Oliva John Springer Bhavani M. Thuraisingham Christopher Vatcher Rakesh M. Verma Susanne Wetzel

Since fall 2012, several National Centers of Academic Excellence in Cyber Defense Research (CAE-Rs) fielded a collaborative course to engage students in solving applied cybersecurity research problems. We describe our experiences with this Information Security Research and Education (INSuRE) research collaborative. We explain how we conducted our project-based research course, give examples of ...

2000
Bradley J. Wood O. Sami Saydjari Victoria Stavridou

We need to change our approach to cyber defense if we are to succeed. We must deeply understand our adversaries, develop effective defensive strategies that will stand the test of time and evolution, and create a new discipline to make this happen. Here is how we start.

2009
William J. Adams Efstratios Gavas Timothy H. Lacey Sylvain P. Leblanc

The Cyber Defense Exercise (CDX) is a four day Information Assurance exercise run by the National Security Agency/Central Security Service (NSA/CSS) to help train federal service academy students in secure network operations. This paper is a collaborative work on the various tools and techniques used and the overall effectiveness of live-attack exercises in teaching information security.

2017
Aswin Chidambaram Pappa

Supervisory Control And Data Acquisition (SCADA) communications are often subjected to various kinds of sophisticated cyber-attacks which can have a serious impact on the Critical Infrastructure such as the power grid. Most of the time, the success of the attack is based on the static characteristics of the system, thereby enabling an easier profiling of the target system(s) by the adversary an...

2017
Sujatha Krishnaswamy

With growing concerns for cyber security of critical infrastructures like the power grid, Cyber-Physical Systems (CPS) security testbeds are essential in providing controlled testing environments for evaluating and validating novel CPS security tools and technologies, thereby accelerating the transition of research to industrial practice. The engineering of such testbeds requires significant in...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید