Cyber-physical power system (CPPS): A review on modeling, simulation, and analysis with cyber security applications

RV Yohanandhan, RM Elavarasan, P Manoharan… - IEEE …, 2020 - ieeexplore.ieee.org
Cyber-Physical System (CPS) is a new kind of digital technology that increases its attention
across academia, government, and industry sectors and covers a wide range of applications …

A review of attack graph and attack tree visual syntax in cyber security

HS Lallie, K Debattista, J Bal - Computer Science Review, 2020 - Elsevier
Perceiving and understanding cyber-attacks can be a difficult task, and more effective
techniques are needed to aid cyber-attack perception. Attack modelling techniques (AMTs) …

A survey of defensive deception: Approaches using game theory and machine learning

M Zhu, AH Anwar, Z Wan, JH Cho… - … Surveys & Tutorials, 2021 - ieeexplore.ieee.org
Defensive deception is a promising approach for cyber defense. Via defensive deception, a
defender can anticipate and prevent attacks by misleading or luring an attacker, or hiding …

A game-theoretic taxonomy and survey of defensive deception for cybersecurity and privacy

J Pawlick, E Colbert, Q Zhu - ACM Computing Surveys (CSUR), 2019 - dl.acm.org
Cyberattacks on both databases and critical infrastructure have threatened public and
private sectors. Ubiquitous tracking and wearable computing have infringed upon privacy …

Reinforcement learning for efficient network penetration testing

MC Ghanem, TM Chen - Information, 2019 - mdpi.com
Penetration testing (also known as pentesting or PT) is a common practice for actively
assessing the defenses of a computer network by planning and executing all possible …

[HTML][HTML] A comprehensive survey on cyber deception techniques to improve honeypot performance

A Javadpour, F Ja'fari, T Taleb, M Shojafar… - Computers & …, 2024 - Elsevier
Honeypot technologies are becoming increasingly popular in cybersecurity as they offer
valuable insights into adversary behavior with a low rate of false detections. By diverting the …

Deception techniques in computer security: A research perspective

X Han, N Kheir, D Balzarotti - ACM Computing Surveys (CSUR), 2018 - dl.acm.org
A recent trend both in academia and industry is to explore the use of deception techniques
to achieve proactive attack detection and defense—to the point of marketing intrusion …

Deceiving cyber adversaries: A game theoretic approach

A Schlenker, O Thakoor, H Xu, F Fang… - … '18: Proceedings of …, 2018 - wrap.warwick.ac.uk
An important way cyber adversaries find vulnerabilities in modern networks is through
reconnaissance, in which they attempt to identify configuration specifics of network hosts. To …

[图书][B] Game theory for cyber deception

J Pawlick, Q Zhu - 2021 - Springer
Interactions both online and in the emerging Internet of things (IoT) feature distributed
agents with local decision-making capabilities and misaligned incentives. This has …

Deep reinforcement learning for green security games with real-time information

Y Wang, ZR Shi, L Yu, Y Wu, R Singh, L Joppa… - Proceedings of the AAAI …, 2019 - aaai.org
Abstract Green Security Games (GSGs) have been proposed and applied to optimize patrols
conducted by law enforcement agencies in green security domains such as combating …