A survey: When moving target defense meets game theory

J Tan, H Jin, H Zhang, Y Zhang, D Chang, X Liu… - Computer Science …, 2023 - Elsevier
Moving target defense (MTD) can break through asymmetry between attackers and
defenders. To improve the effectiveness of cybersecurity defense techniques, defense …

A dynamic games approach to proactive defense strategies against advanced persistent threats in cyber-physical systems

L Huang, Q Zhu - Computers & Security, 2020 - Elsevier
Abstract Advanced Persistent Threats (APTs) have recently emerged as a significant security
challenge for a cyber-physical system due to their stealthy, dynamic and adaptive nature …

A risk management approach to defending against the advanced persistent threat

LX Yang, P Li, X Yang, YY Tang - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
The advanced persistent threat (APT) as a new kind of cyber attack has posed a severe
threat to modern organizations. When the APT has been detected, the organization has to …

Insider threat modeling: An adversarial risk analysis approach

C Joshi, JR Aliaga, DR Insua - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Insider threats entail major security issues in many organizations. Game theoretic models of
insider threats so far proposed do not take into account important factors such as the …

Defense against advanced persistent threat through data backup and recovery

LX Yang, K Huang, X Yang, Y Zhang… - … on Network Science …, 2020 - ieeexplore.ieee.org
Advanced persistent threat (APT) as a generic highly sophisticated cyber attack poses a
severe threat to organizational data security. Since the conventional detection and repair …

Evolutionary game theoretic analysis of advanced persistent threats against cloud storage

AAA Abass, L Xiao, NB Mandayam, Z Gajic - IEEE Access, 2017 - ieeexplore.ieee.org
Advanced Persistent Threats (APTs) represent stealthy, powerful, long-term, and well-
funded attacks against cyber systems, such as data centers and cloud storage. Evolutionary …

FlipIt game model-based defense strategy against cyberattacks on SCADA systems considering insider assistance

Z Liu, L Wang - IEEE Transactions on Information Forensics …, 2021 - ieeexplore.ieee.org
The industrial internet of things (IIoT) is emerging as a global trend to dramatically enhance
the intelligence and efficiency of the industries in recent years. With the emphasis on data …

Automotive cybersecurity: Assessing a new platform for cybercrime and malicious hacking

J Kennedy, T Holt, B Cheng - Journal of Crime and Justice, 2019 - Taylor & Francis
The push for technological enhancement and Internet connectivity in all aspects of modern
life is radically transforming our use of devices and equipment that was not designed with …

Dynamic resource management to defend against advanced persistent threats in fog computing: A game theoretic approach

S Feng, Z Xiong, D Niyato… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Fog computing has gained tremendous popularity due to its capability of addressing the
surging demand on high-quality ubiquitous mobile services. Nevertheless, the highly …

: An Adaptive Reinforcement Learning Strategy for the Security Game

L Oakley, A Oprea - International Conference on Decision and Game …, 2019 - Springer
A rise in Advanced Persistent Threats (APTs) has introduced a need for robustness against
long-running, stealthy attacks which circumvent existing cryptographic security guarantees …