Network defense strategy based on cyber attack behavior prediction

被引:0
|
作者
机构
[1] Ren, Wu-Ling
[2] Zhao, Cui-Wen
[3] Jiang, Guo-Xin
[4] Maimon, David
[5] Wilson, Theodore
[6] Sobesto, Bertrand
来源
| 1600年 / Zhejiang University卷 / 48期
关键词
D O I
10.3785/j.issn.1008-973X.2014.12.007
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [31] Network Attack Defense Awareness based on Dynamic Game
    Li, Man
    Cao, Jinjing
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (07): : 69 - 77
  • [32] Vulnerability Analysis of Power Systems Based on Cyber-Attack and Defense Models
    Hasan, Saqib
    Ghafouri, Amin
    Dubey, Abhishek
    Karsai, Gabor
    Koutsoukos, Xenofon
    2018 IEEE POWER & ENERGY SOCIETY INNOVATIVE SMART GRID TECHNOLOGIES CONFERENCE (ISGT), 2018,
  • [33] Cyber Attack Detection and Prediction System
    Siva, O. Venkata
    Neeraja, Karanki
    Kalyan, Dondapati
    Naga, Kandula Siva
    2024 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATION AND APPLIED INFORMATICS, ACCAI 2024, 2024,
  • [34] Analysis of hybrid attack and defense based on block withholding strategy
    Liao, Binjie
    Chen, Hongyi
    Wang, Yu
    Meng, Weizhi
    Zhang, Jun
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2023, 78
  • [35] Catch the Cyber Thief: A Multi-Dimensional Asymmetric Network Attack-Defense Game
    Wang, Wenhao
    Chen, Xingguo
    Li, Yuwei
    Zhu, Cheng
    APPLIED SCIENCES-BASEL, 2024, 14 (20):
  • [36] A methodological review on attack and defense strategies in cyber warfare
    Ramaswamy Swarnammal Shaji
    V. Sachin Dev
    Thomas Brindha
    Wireless Networks, 2019, 25 : 3323 - 3334
  • [37] A methodological review on attack and defense strategies in cyber warfare
    Shaji, Ramaswamy Swarnammal
    Dev, V. Sachin
    Brindha, Thomas
    WIRELESS NETWORKS, 2019, 25 (06) : 3323 - 3334
  • [38] The Role of Situational Awareness in Cyber Security and Cyber Defense Strategy
    Onwubiko, Cyril
    2015 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA), 2015,
  • [39] CYBER ATTACK AND DEFENSE TRAINING: USING EMULAB AS A PLATFORM
    Kuo, Cheng-Chung
    Chain, Kai
    Yang, Chu-Sing
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2018, 14 (06): : 2245 - 2258
  • [40] Game Control of Attack and Defense in Cyber Physical System
    Cai, Xiaobo
    Wang, Baijuan
    Cao, Zhiyong
    Zhang, Haitao
    Han, Ke
    Chen, Min
    Xu, Jiajun
    Zi, Caifei
    Wu, Wendou
    2020 INTERNATIONAL CONFERENCE ON IDENTIFICATION, INFORMATION AND KNOWLEDGE IN THE INTERNET OF THINGS (IIKI2020), 2021, 187 : 488 - 494