Optimal countermeasures selection against cyber attacks: A comprehensive survey on reaction frameworks

P Nespoli, D Papamartzivanos… - … Surveys & Tutorials, 2017 - ieeexplore.ieee.org
It is without doubt that today the volume and sophistication of cyber attacks keeps
consistently growing, militating an endless arm race between attackers and defenders. In …

Exploiting attack–defense trees to find an optimal set of countermeasures

B Fila, W Wideł - 2020 IEEE 33rd computer security …, 2020 - ieeexplore.ieee.org
Selecting the most pertinent countermeasures to secure a system is one of the ultimate
goals of risk assessment. In this context, it is important to rely on modeling methods that the …

Cyber attack detection thanks to machine learning algorithms

A Delplace, S Hermoso, K Anandita - arXiv preprint arXiv:2001.06309, 2020 - arxiv.org
Cybersecurity attacks are growing both in frequency and sophistication over the years. This
increasing sophistication and complexity call for more advancement and continuous …

[HTML][HTML] Systematic review and quantitative comparison of cyberattack scenario detection and projection

I Kovačević, S Groš, K Slovenec - Electronics, 2020 - mdpi.com
Intrusion Detection Systems (IDSs) automatically analyze event logs and network traffic in
order to detect malicious activity and policy violations. Because IDSs have a large number of …

A Comprehensive Survey: Evaluating the Efficiency of Artificial Intelligence and Machine Learning Techniques on Cyber Security Solutions

M Ozkan-Ozay, E Akin, Ö Aslan, S Kosunalp… - IEEE …, 2024 - ieeexplore.ieee.org
Given the continually rising frequency of cyberattacks, the adoption of artificial intelligence
methods, particularly Machine Learning (ML), Deep Learning (DL), and Reinforcement …

Prospective artificial intelligence approaches for active cyber defence

N Dhir, H Hoeltgebaum, N Adams, M Briers… - arXiv preprint arXiv …, 2021 - arxiv.org
Cybercriminals are rapidly developing new malicious tools that leverage artificial
intelligence (AI) to enable new classes of adaptive and stealthy attacks. New defensive …

Recent cyber security attacks and their mitigation approaches–an overview

A Chowdhury - Applications and Techniques in Information Security …, 2016 - Springer
The advent of digital media, Internet, web and online social media has drawn the attention of
relevant research community significantly and created many new research challenges on …

[HTML][HTML] Dynamic defenses in cyber security: Techniques, methods and challenges

Y Zheng, Z Li, X Xu, Q Zhao - Digital Communications and Networks, 2022 - Elsevier
Driven by the rapid development of the Internet of Things, cloud computing and other
emerging technologies, the connotation of cyberspace is constantly expanding and …

Mimic defense: a designed‐in cybersecurity defense framework

H Hu, J Wu, Z Wang, G Cheng - IET Information Security, 2018 - Wiley Online Library
In recent years, both academia and industry in cyber security have tried to develop
innovative defense technologies, expecting that to change the rules of the game between …

[HTML][HTML] Two decades of cyberattack simulations: A systematic literature review

V Engström, R Lagerström - Computers & Security, 2022 - Elsevier
Cyberattack simulations appear across multiple computer security domains and are
interpreted in many different but equally viable ways. However, this makes the topic appear …