Cyberattacks on both databases and critical infrastructure have threatened public and private sectors. Ubiquitous tracking and wearable computing have infringed upon privacy …
Honeypot technologies are becoming increasingly popular in cybersecurity as they offer valuable insights into adversary behavior with a low rate of false detections. By diverting the …
A recent trend both in academia and industry is to explore the use of deception techniques to achieve proactive attack detection and defense—to the point of marketing intrusion …
SR Etesami, T Başar - Dynamic Games and Applications, 2019 - Springer
Due to complex dependencies between multiple layers and components of emerging cyber- physical systems, security and vulnerability of such systems have become a major challenge …
The Internet of Vehicles (IoV), whereby interconnected vehicles that communicate with each other and with road infrastructure on a common network, has promising socio-economic …
As infamous hacker Kevin Mitnick describes in his book The Art of Deception," the human factor is truly security's weakest link"[18]. Deception has been widely successful when used …
In this paper, we propose a scalable algorithm to allocate honeypots over an attack graph. We formulate a two-person zero-sum strategic game between the network defender and an …
Game theory is being used in cybersecurity to observe different attacks as it can provide a mathematical representation of the interactions between system admins, hackers, and users …
The smart grid provides advanced functionalities, including real-time monitoring, dynamic energy management, advanced pricing mechanisms, and self-healing, by enabling the two …