A Game-Theoretic Method for Defending Against Advanced Persistent Threats in Cyber Systems
Published 2022 View Full Article
- Home
- Publications
- Publication Search
- Publication Details
Title
A Game-Theoretic Method for Defending Against Advanced Persistent Threats in Cyber Systems
Authors
Keywords
-
Journal
IEEE Transactions on Information Forensics and Security
Volume 18, Issue -, Pages 1349-1364
Publisher
Institute of Electrical and Electronics Engineers (IEEE)
Online
2022-12-16
DOI
10.1109/tifs.2022.3229595
References
Ask authors/readers for more resources
Related references
Note: Only part of the references are listed.- Learning Games for Defending Advanced Persistent Threats in Cyber Systems
- (2022) Tianqing Zhu et al. IEEE Transactions on Systems Man Cybernetics-Systems
- A Game-Theoretic Federated Learning Framework for Data Quality Improvement
- (2022) Lefeng Zhang et al. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING
- Honeypot Detection Strategy Against Advanced Persistent Threats in Industrial Internet of Things: A Prospect Theoretic Game
- (2021) Wen Tian et al. IEEE Internet of Things Journal
- Foureye: Defensive Deception Against Advanced Persistent Threats via Hypergame Theory
- (2021) Zelin Wan et al. IEEE Transactions on Network and Service Management
- A New Proposal on the Advanced Persistent Threat: A Survey
- (2020) Santiago Quintero-Bonilla et al. Applied Sciences-Basel
- A Game-Theoretic Approach for Dynamic Information Flow Tracking to Detect Multistage Advanced Persistent Threats
- (2020) Shana Moothedath et al. IEEE TRANSACTIONS ON AUTOMATIC CONTROL
- Game Theoretical Adversarial Deep Learning With Variational Adversaries
- (2020) Aneesh Sreevallabh Chivukula et al. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING
- Survey of publicly available reports on advanced persistent threat actors
- (2018) Antoine Lemay et al. COMPUTERS & SECURITY
- Distributed Computation of Equilibria in Misspecified Convex Stochastic Nash Games
- (2018) Hao Jiang et al. IEEE TRANSACTIONS ON AUTOMATIC CONTROL
- Cyber-Threat Mitigation Exploiting the Birth–Death–Immigration Model
- (2018) Vincenzo Matta et al. IEEE Transactions on Information Forensics and Security
- Attacker-Centric View of a Detection Game Against Advanced Persistent Threats
- (2018) Liang Xiao et al. IEEE TRANSACTIONS ON MOBILE COMPUTING
- A risk management approach to defending against the advanced persistent threat
- (2018) Lu-Xing Yang et al. IEEE Transactions on Dependable and Secure Computing
- Effective Repair Strategy Against Advanced Persistent Threat: A Differential Game Approach
- (2018) Lu-Xing Yang et al. IEEE Transactions on Information Forensics and Security
- Defending Against Advanced Persistent Threats Using Game-Theory
- (2017) Stefan Rass et al. PLoS One
- Establishing evolutionary game models for CYBer security information EXchange (CYBEX)
- (2016) Deepak Tosh et al. JOURNAL OF COMPUTER AND SYSTEM SCIENCES
- Human-level control through deep reinforcement learning
- (2015) Volodymyr Mnih et al. NATURE
- FlipIt: The Game of “Stealthy Takeover”
- (2012) Marten van Dijk et al. JOURNAL OF CRYPTOLOGY
Find Funding. Review Successful Grants.
Explore over 25,000 new funding opportunities and over 6,000,000 successful grants.
ExploreCreate your own webinar
Interested in hosting your own webinar? Check the schedule and propose your idea to the Peeref Content Team.
Create Now