Network defense strategy based on cyber attack behavior prediction

被引:0
|
作者
机构
[1] Ren, Wu-Ling
[2] Zhao, Cui-Wen
[3] Jiang, Guo-Xin
[4] Maimon, David
[5] Wilson, Theodore
[6] Sobesto, Bertrand
来源
| 1600年 / Zhejiang University卷 / 48期
关键词
D O I
10.3785/j.issn.1008-973X.2014.12.007
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [21] Cyber-attack and defense simulation framework
    Bergin, Dennis Lee
    JOURNAL OF DEFENSE MODELING AND SIMULATION-APPLICATIONS METHODOLOGY TECHNOLOGY-JDMS, 2015, 12 (04): : 383 - 392
  • [22] Cyber Attack and Defense on Industry Control Systems
    Lin, Chih-Ta
    Wu, Sung-Lin
    Lee, Mei-Lin
    2017 IEEE CONFERENCE ON DEPENDABLE AND SECURE COMPUTING, 2017, : 524 - 526
  • [23] Power system cyber attack and its defense
    Ni M.
    Yan J.
    Bo R.
    Tang Y.
    Ni, Ming (ni-ming@sgepri.sgcc.com.cn), 1600, Automation of Electric Power Systems Press (40): : 148 - 151
  • [24] Hypergame Theory applied to Cyber Attack and Defense
    House, James Thomas
    Cybenko, George
    SENSORS, AND COMMAND, CONTROL, COMMUNICATIONS, AND INTELLIGENCE (C3I) TECHNOLOGIES FOR HOMELAND SECURITY AND HOMELAND DEFENSE IX, 2010, 7666
  • [25] Use of cyber attack and defense agents in cyber ranges: A case study
    Yamin, Muhammad Mudassar
    Katt, Basel
    COMPUTERS & SECURITY, 2022, 122
  • [26] Cyber-Attack Prediction Based on Network Intrusion Detection Systems for Alert Correlation Techniques: A Survey
    Albasheer, Hashim
    Siraj, Maheyzah Md
    Mubarakali, Azath
    Tayfour, Omer Elsier
    Salih, Sayeed
    Hamdan, Mosab
    Khan, Suleman
    Zainal, Anazida
    Kamarudeen, Sameer
    SENSORS, 2022, 22 (04)
  • [27] Attack Analysis Framework for Cyber-Attack and Defense Test Platform
    Qi, Yulu
    Jiang, Rong
    Jia, Yan
    Li, Aiping
    ELECTRONICS, 2020, 9 (09) : 1 - 18
  • [28] Research on the game of network security attack-defense confrontation through the optimal defense strategy
    Liu, Fei
    Gao, Hongyan
    Wei, Zegang
    SECURITY AND PRIVACY, 2021, 4 (01):
  • [29] An Evolutionary Strategy for Resilient Cyber Defense
    Fulp, Errin W.
    Gage, H. Donald
    John, David J.
    McNiece, Matthew R.
    Turkett, William H.
    Zhou, Xin
    2015 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2015,
  • [30] Strategic Defense and Attack in Deception based Network Security
    Fraunholz, Daniel
    Schotten, Hans Dieter
    2018 32ND INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN), 2018, : 156 - 161