نتایج جستجو برای: cyber defense

تعداد نتایج: 91877  

Journal: :Systems 2023

With the significant growth of cyber environment over recent years, defensive mechanisms against adversaries have become an important step in maintaining online safety. The adaptive defense mechanism is evolving approach that, when combined with nature-inspired algorithms, allows users to effectively run a series artificial intelligence-driven tests on their customized networks detect normal an...

Journal: :International Journal of Advanced Computer Science and Applications 2022

Blockchain technology has now emerged as a ground-breaking with possible solutions to applications from securing smart cities e-voting systems. Although it started digital currency or cryptocurrency, bitcoin, there is no doubt that blockchain influencing and will influence business society more in the near future. We present comprehensive survey of how applied provide security over web counter ...

Journal: :Intelligent Automation and Soft Computing 2023

The static nature of cyber defense systems gives attackers a sufficient amount time to explore and further exploit the vulnerabilities information technology systems. In this paper, we investigate problem where multiagent sensing acting in an environment contribute adaptive defense. We present learning strategy that enables multiple agents learn optimal policies using reinforcement (MARL). Our ...

Journal: :CoRR 2017
Tam N. Nguyen

Considering the gaining popularity of ”defense in depth” strategy, plus increasing amounts of money invested in information security layers, and considering adversaries’ perspective while carrying out a long-term advanced-persistent attack campaign; avoiding (short term) detections may not be as beneficial as having a deeper knowledge about targeted ”defense in depth” system. Probing and steali...

Journal: :The Journal of The Institute of Image Information and Television Engineers 2018

2016
Andrew Fielder Tingting Li Chris Hankin

Industrial Control Systems (ICS) play a critical role in controlling industrial processes. Wide use of modern IT technologies enables cyber attacks to disrupt the operation of ICS. Advanced Persistent Threats (APT) are the most threatening attacks to ICS due to their long persistence and destructive cyberphysical effects to ICS. This paper considers a simulation of attackers and defenders of an...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید