H Kavak, JJ Padilla, D Vernon-Bido… - Journal of …, 2021 - academic.oup.com
In this article, we provide an introduction to simulation for cybersecurity and focus on three themes:(1) an overview of the cybersecurity domain;(2) a summary of notable simulation …
N Mhaskar, M Alabbad, R Khedri - Computers & Security, 2021 - Elsevier
Network segmentation or compartmentalization, and layered protection are two strategies that are critical in building a secure network. In the literature, layered protection has been …
Edge intelligence, network autonomy, broadband satellite connectivity, and other concepts for private 6G networks are enabling new applications for public safety authorities, eg, for …
K Bennouk, N Ait Aali, Y El Bouzekri El Idrissi… - … of Cybersecurity and …, 2024 - mdpi.com
The number of new vulnerabilities continues to rise significantly each year. Simultaneously, vulnerability databases have challenges in promptly sharing new security events with …
K Hammar, R Stadler - IEEE Transactions on Network and …, 2022 - ieeexplore.ieee.org
We study automated intrusion prevention using reinforcement learning. Following a novel approach, we formulate the problem of intrusion prevention as an (optimal) multiple stopping …
The sustainable development of smart grids requires the massive deployment of renewable energy, in a highly distributed manner, introducing new challenges for the system operation …
Background Digital phenotyping, the measurement of human behavioral phenotypes using personal devices, is rapidly gaining popularity. Novel initiatives, ranging from software …
K Hammar, R Stadler - IEEE Transactions on Network and …, 2023 - ieeexplore.ieee.org
We study automated intrusion response and formulate the interaction between an attacker and a defender as an optimal stopping game where attack and defense strategies evolve …
B Akhmetov, V Lakhno, B Akhmetov… - Intelligent Systems in …, 2019 - Springer
The paper considers the prerequisites for the integration of various expert and decision support systems for information security and cybersecurity. Analyzed the possibility of …