[PDF][PDF] Simulation for cybersecurity: state of the art and future directions

H Kavak, JJ Padilla, D Vernon-Bido… - Journal of …, 2021 - academic.oup.com
In this article, we provide an introduction to simulation for cybersecurity and focus on three
themes:(1) an overview of the cybersecurity domain;(2) a summary of notable simulation …

Adversarial genetic programming for cyber security: A rising application domain where GP matters

UM O'Reilly, J Toutouh, M Pertierra… - … and Evolvable Machines, 2020 - Springer
Cyber security adversaries and engagements are ubiquitous and ceaseless. We delineate
Adversarial Genetic Programming for Cyber Security, a research topic that, by means of …

Risk and threat mitigation techniques in internet of things (IoT) environments: a survey

M Salayma - Frontiers in The Internet of Things, 2024 - frontiersin.org
Security in the Internet of Things (IoT) remains a predominant area of concern. Although
several other surveys have been published on this topic in recent years, the broad spectrum …

Defending active directory by combining neural network based dynamic program and evolutionary diversity optimisation

D Goel, MH Ward-Graham, A Neumann… - Proceedings of the …, 2022 - dl.acm.org
Active Directory (AD) is the default security management system for Windows domain
networks. We study a Stackelberg game model between one attacker and one defender on …

Hardening Active Directory Graphs via Evolutionary Diversity Optimization based Policies

D Goel, M Ward, A Neumann, F Neumann… - ACM Transactions on …, 2024 - dl.acm.org
Active Directory (AD) is the default security management system for Windows domain
networks. An AD environment can be described as a cyber-attack graph, with nodes …

[HTML][HTML] Zero Trust Cybersecurity: Procedures and Considerations in Context

BD Lund, TH Lee, Z Wang, T Wang, NR Mannuru - Encyclopedia, 2024 - mdpi.com
Definition In response to the increasing complexity and sophistication of cyber threats,
particularly those enhanced by advancements in artificial intelligence, traditional security …

Enhancing Network Resilience through Machine Learning-powered Graph Combinatorial Optimization: Applications in Cyber Defense and Information Diffusion

D Goel - arXiv preprint arXiv:2310.10667, 2023 - arxiv.org
With the burgeoning advancements of computing and network communication technologies,
network infrastructures and their application environments have become increasingly …

A trilevel model for segmentation of the power transmission grid cyber network

B Arguello, ES Johnson, JL Gearhart - IEEE Systems Journal, 2022 - ieeexplore.ieee.org
Network segmentation of a power grid's communication system can make the grid more
resilient to cyberattacks. We develop a novel trilevel programming model to optimally …

Adversarial Evolutionary Learning with Distributed Spatial Coevolution

J Toutouh, E Hemberg, UM O'Reilly - Handbook of Evolutionary Machine …, 2023 - Springer
Abstract Adversarial Evolutionary Learning (AEL) is concerned with competing adversaries
that are adapting over time. This competition can be defined as a minimization …

Improved cyber defense modeling framework for modeling and simulating the lifecycle of cyber defense activities

D Kim, MK Ahn, S Lee, D Lee, M Park, D Shin - IEEE Access, 2023 - ieeexplore.ieee.org
It is difficult to assess the business impact of a cyberattack and implement appropriate
strategies or policies to enhance cyber resilience and counter future attacks. Penetration …