Z Zhu, M Chen, C Zhu, Y Zhu - Computers & Security, 2024 - Elsevier
Network security is a critical discipline in the contemporary digital world, encompassing diverse technologies and strategies aimed at safeguarding computer systems, networks …
Network security investigations pose many challenges to security analysts attempting to identify the root cause of security alarms or incidents. Analysts are often presented with …
Cyber defense exercises are an important avenue to understand the technical capacity of organizations when faced with cyber-threats. Information derived from these exercises often …
C Baillie, M Standen, J Schwartz, M Docking… - arXiv preprint arXiv …, 2020 - arxiv.org
Autonomous Cyber Operations (ACO) involves the consideration of blue team (defender) and red team (attacker) decision-making models in adversarial scenarios. To support the …
UM O'Reilly, J Toutouh, M Pertierra… - … and Evolvable Machines, 2020 - Springer
Cyber security adversaries and engagements are ubiquitous and ceaseless. We delineate Adversarial Genetic Programming for Cyber Security, a research topic that, by means of …
A Shashkov, E Hemberg, M Tulla… - The Knowledge …, 2023 - cambridge.org
We investigate artificial intelligence and machine learning methods for optimizing the adversarial behavior of agents in cybersecurity simulations. Our cybersecurity simulations …
As machine learning models become more capable, they have exhibited increased potential in solving complex tasks. One of the most promising directions uses deep reinforcement …
D Garcia, AE Lugo, E Hemberg… - Proceedings of the Genetic …, 2017 - dl.acm.org
We introduce a new cybersecurity project named RIVALS. RIVALS will assist in developing network defense strategies through modeling adversarial network attack and defense …
The focus on cyber security as an interaction between technical elements and humans has typically confined consideration of the latter to practical issues of implementation …