Paraplegia 发表于 2025-3-26 23:02:07

Reinforcement Learning for Adaptive Cyber Defense Against Zero-Day Attacks,cks where the attacker chooses its actions by following a predetermined probability distribution; and attacks depicted by Bayesian attack graphs where the attacker exploits combinations of multiple known or zero-day vulnerabilities to compromise machines in a network.

neurologist 发表于 2025-3-27 01:35:37

http://reply.papertrans.cn/16/1505/150413/150413_32.png

ARC 发表于 2025-3-27 06:54:50

Overview of Control and Game Theory in Adaptive Cyber Defenses,arget Defenses and Adaptive Cyber Defense. We begin by observing that there are fundamental differences between control models and game models that are important for security practitioners to understand. Those differences will be illustrated through simple but realistic cyber operations scenarios, e

Spinal-Fusion 发表于 2025-3-27 12:00:35

http://reply.papertrans.cn/16/1505/150413/150413_34.png

恶意 发表于 2025-3-27 15:56:46

http://reply.papertrans.cn/16/1505/150413/150413_35.png

apiary 发表于 2025-3-27 20:55:36

Reinforcement Learning for Adaptive Cyber Defense Against Zero-Day Attacks,orcement learning is an integration of control theory and machine learning. A salient feature of reinforcement learning is that it does not require the defender to know critical information of zero-day attacks (e.g., their attack targets, and the locations of the vulnerabilities). This information i

用树皮 发表于 2025-3-28 00:49:12

Moving Target Defense Quantification,curity landscape. The tactical advantages that MTD can provide to the defender have led to the development of a vast array of diverse techniques, which are designed to operate under different constraints and against different classes of threats. Due to the diverse nature of these various techniques

担忧 发表于 2025-3-28 04:54:10

Empirical Game-Theoretic Methods for Adaptive Cyber-Defense, empirical game-theoretic analysis approach, games are modeled by simulation, thus significantly increasing the level of complexity that can be addressed. We survey applications of this approach to scenarios of adaptive cyber-defense, illustrating how the method operates, and assessing its strengths

灾祸 发表于 2025-3-28 08:13:57

http://reply.papertrans.cn/16/1505/150413/150413_39.png

我吃花盘旋 发表于 2025-3-28 11:31:10

Adaptive Cyber Defenses for Botnet Detection and Mitigation,utions brings significant benefits to both commercial and government organizations, it also exposes them to an array of novel threats. Specifically, malicious actors can use networks of compromised and remotely controlled hosts, known as botnets, to execute a number of different cyber-attacks and en
页: 1 2 3 [4] 5
查看完整版本: Titlebook: Adversarial and Uncertain Reasoning for Adaptive Cyber Defense; Control- and Game-Th Sushil Jajodia,George Cybenko,Michael Wellman Book 201