UM O'Reilly, J Toutouh, M Pertierra… - … and Evolvable Machines, 2020 - Springer
Cyber security adversaries and engagements are ubiquitous and ceaseless. We delineate Adversarial Genetic Programming for Cyber Security, a research topic that, by means of …
M Salayma - Frontiers in The Internet of Things, 2024 - frontiersin.org
Security in the Internet of Things (IoT) remains a predominant area of concern. Although several other surveys have been published on this topic in recent years, the broad spectrum …
Active Directory (AD) is the default security management system for Windows domain networks. We study a Stackelberg game model between one attacker and one defender on …
Active Directory (AD) is the default security management system for Windows domain networks. An AD environment can be described as a cyber-attack graph, with nodes …
Definition In response to the increasing complexity and sophistication of cyber threats, particularly those enhanced by advancements in artificial intelligence, traditional security …
D Goel - arXiv preprint arXiv:2310.10667, 2023 - arxiv.org
With the burgeoning advancements of computing and network communication technologies, network infrastructures and their application environments have become increasingly …
B Arguello, ES Johnson, JL Gearhart - IEEE Systems Journal, 2022 - ieeexplore.ieee.org
Network segmentation of a power grid's communication system can make the grid more resilient to cyberattacks. We develop a novel trilevel programming model to optimally …
Abstract Adversarial Evolutionary Learning (AEL) is concerned with competing adversaries that are adapting over time. This competition can be defined as a minimization …
D Kim, MK Ahn, S Lee, D Lee, M Park, D Shin - IEEE Access, 2023 - ieeexplore.ieee.org
It is difficult to assess the business impact of a cyberattack and implement appropriate strategies or policies to enhance cyber resilience and counter future attacks. Penetration …