AI and security of critical infrastructure

J Sakhnini, H Karimipour, A Dehghantanha… - Handbook of Big Data …, 2020 - Springer
The development of today's critical infrastructure is increasingly dependent on smart
technology and interconnection of networks. This introduces many vulnerabilities to cyber …

A novel method for detecting APT attacks by using OODA loop and black swan theory

T Bodström, T Hämäläinen - Computational Data and Social Networks: 7th …, 2018 - Springer
Abstract Advanced Persistent Threat (APT) attacks are a major concern for the modern
societal digital infrastructures due to their highly sophisticated nature. The purpose of these …

A taxonomy of technical attribution techniques for cyber attacks

A Nicholson, T Watson, P Norris, A Duffy… - … on information warfare …, 2012 - books.google.com
In recent years the number of cyber-attacks has dramatically increased, affecting military,
government, business and home users. For example, the UK Ministry of Defence claims to …

Adversarial dynamics: the conficker case study

D Bilar, G Cybenko, J Murphy - Moving Target Defense II: Application of …, 2012 - Springer
It is well known that computer and network security is an adversarial challenge. Attackers
develop exploits and defenders respond to them through updates, service packs or other …

[PDF][PDF] Wide spectrum attribution: Using deception for attribution intelligence in cyber attacks

A Nicholson - 2015 - core.ac.uk
Modern cyber attacks have evolved considerably. The skill level required to conduct a cyber
attack is low. Computing power is cheap, targets are diverse and plentiful. Point-and-click …

Rolling the dice-deceptive authentication for attack attribution

A Nicholson, H Janicke, T Watson… - Iccws 2015-The …, 2015 - books.google.com
Technical attack attribution techniques aim to identify the details of the origin of a cyber
attack, answering questions such as “who, what, when, where and why”. This includes the …

[PDF][PDF] AI-enabled cyber weapons and implications for cybersecurity

M Shoaib - Journal of Strategic Affairs of, 2016 - academia.edu
In recent years, the prospect of autonomous and selflearning weapon systems has attracted
significant public attention. Consequently, advancements in the fields of artificial intelligence …

A Cyberspace Ontology Model Under Non-cooperative Conditions

J Yao, Y Zhao - International Conference on Smart City and …, 2019 - Springer
The activities of cyberspace are not always cooperative, and confrontational behavior under
non-cooperative conditions has even occurred at the beginning of the Internet and will …