Network defense strategy based on cyber attack behavior prediction

被引:0
|
作者
机构
[1] Ren, Wu-Ling
[2] Zhao, Cui-Wen
[3] Jiang, Guo-Xin
[4] Maimon, David
[5] Wilson, Theodore
[6] Sobesto, Bertrand
来源
| 1600年 / Zhejiang University卷 / 48期
关键词
D O I
10.3785/j.issn.1008-973X.2014.12.007
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [1] Cyber Attack-Defense Game Strategy Solving Based on Reinforcement Learning and Self-play Cyber Attack-Defense Game Solver
    Zhang, Jie
    Luo, Yunfeng
    PROCEEDINGS OF 2024 3RD INTERNATIONAL CONFERENCE ON CRYPTOGRAPHY, NETWORK SECURITY AND COMMUNICATION TECHNOLOGY, CNSCT 2024, 2024, : 135 - 141
  • [2] A Network Security Prediction Method Based on Attack Defense Tree
    Li, Junyi
    Wu, Yongdong
    Li, Yang
    Zhang, Ziwen
    Fouad, Hassan
    Altameem, Torki
    JOURNAL OF NANOELECTRONICS AND OPTOELECTRONICS, 2023, 18 (03) : 357 - 366
  • [3] Node Coupling Degree Based Defense Strategy Against Continuous Cyber Attack on Power Grid
    Yu, Yunhao
    Zhang, Boda
    Di, Chameiling
    Luo, Fuhua
    Jiang, Chengdong
    Zhu, Bin
    2024 THE 7TH INTERNATIONAL CONFERENCE ON ENERGY, ELECTRICAL AND POWER ENGINEERING, CEEPE 2024, 2024, : 759 - 763
  • [4] Research survey on defense strategy of attack threat in cyber physical systems
    Wen, Cheng-Lin
    Yang, Li
    Kongzhi Lilun Yu Yingyong/Control Theory and Applications, 2024, 41 (12): : 2224 - 2236
  • [5] Cyber-Attack Risks Analysis Based on Attack-Defense Trees
    Sun, Wenjun
    Lv, Liqun
    Su, Yang
    Wang, Xu An
    ADVANCES IN INTERNETWORKING, DATA & WEB TECHNOLOGIES, EIDWT-2017, 2018, 6 : 667 - 678
  • [6] Generating Network Security Defense Strategy Based on Cyber Threat Intelligence Knowledge Graph
    Zhang, Shuqin
    Li, Shuhan
    Chen, Peng
    Wang, Shijie
    Zhao, Chunxia
    EMERGING NETWORKING ARCHITECTURE AND TECHNOLOGIES, ICENAT 2022, 2023, 1696 : 507 - 519
  • [7] A Model of APT Attack Defense Based on Cyber Threat Detection
    Li, Yue
    Zhang, Teng
    Li, Xue
    Li, Ting
    CYBER SECURITY, CNCERT 2018, 2019, 970 : 122 - 135
  • [8] A Flow Attack Strategy based on Critical Links for Cyber-attack
    Qi, Jiming
    Zhang, Jiazheng
    Liu, Qingxia
    Wang, Bang
    2022 IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, 2022, : 913 - 920
  • [9] Cyber Attack and Defense Emulation Agents
    Yoo, Jeong Do
    Park, Eunji
    Lee, Gyungmin
    Ahn, Myung Kil
    Kim, Donghwa
    Seo, Seongyun
    Kim, Huy Kang
    APPLIED SCIENCES-BASEL, 2020, 10 (06):
  • [10] Attack and Defense Strategy of Distribution Network Cyber-Physical System Considering EV Source-Charge Bidirectionality
    Li, Tong
    Zhao, Hai
    Wang, Shihao
    Yang, Chao
    Huang, Bonan
    ELECTRONICS, 2021, 10 (23)