相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。Optimization of APT attack detection based on a model combining ATTENTION and deep learning
Cho Do Xuan et al.
JOURNAL OF INTELLIGENT & FUZZY SYSTEMS (2022)
Poirot: Causal Correlation Aided Semantic Analysis for Advanced Persistent Threat Detection
Jian Yang et al.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2022)
Detecting and Mitigating the Dissemination of Fake News: Challenges and Future Research Opportunities
Wajiha Shahid et al.
IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS (2022)
Developing Cost-Effective Rumor-Refuting Strategy Through Game-Theoretic Approach
Da-Wen Huang et al.
IEEE SYSTEMS JOURNAL (2021)
Effective Quarantine and Recovery Scheme Against Advanced Persistent Threat
Lu-Xing Yang et al.
IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS (2021)
Nash equilibria in nonzero-sum differential games with impulse control
Utsav Sadana et al.
EUROPEAN JOURNAL OF OPERATIONAL RESEARCH (2021)
Dynamic Resource Management to Defend Against Advanced Persistent Threats in Fog Computing: A Game Theoretic Approach
Shaohan Feng et al.
IEEE TRANSACTIONS ON CLOUD COMPUTING (2021)
Defense Against Advanced Persistent Threat Through Data Backup and Recovery
Lu-Xing Yang et al.
IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING (2021)
Advanced Persistent Threat Detection: A Survey
Adam Khalid et al.
2021 3RD INTERNATIONAL CYBER RESILIENCE CONFERENCE (CRC) (2021)
A Risk Management Approach to Defending Against the Advanced Persistent Threat
Lu-Xing Yang et al.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2020)
A New Proposal on the Advanced Persistent Threat: A Survey
Santiago Quintero-Bonilla et al.
APPLIED SCIENCES-BASEL (2020)
FlipIn: A Game-Theoretic Cyber Insurance Framework for Incentive-Compatible Cyber Risk Management of Internet of Things
Rui Zhang et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2020)
A Survey on Game-Theoretic Approaches for Intrusion Detection and Response Optimization
Christophe Kiennert et al.
ACM COMPUTING SURVEYS (2019)
Effective Repair Strategy Against Advanced Persistent Threat: A Differential Game Approach
Lu-Xing Yang et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2019)
Seeking Best-Balanced Patch-Injecting Strategies through Optimal Control Approach
Kaifan Huang et al.
SECURITY AND COMMUNICATION NETWORKS (2019)
A Game-theoretic Taxonomy and Survey of Defensive Deception for Cybersecurity and Privacy
Jeffrey Pawlick et al.
ACM COMPUTING SURVEYS (2019)
A Survey on Advanced Persistent Threats: Techniques, Solutions, Challenges, and Research Opportunities
Adel Alshamrani et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2019)
Survey of publicly available reports on advanced persistent threat actors
Antoine Lemay et al.
COMPUTERS & SECURITY (2018)
Attacker-Centric View of a Detection Game against Advanced Persistent Threats
Liang Xiao et al.
IEEE TRANSACTIONS ON MOBILE COMPUTING (2018)
Propagation From Deceptive News Sources Who Shares, How Much, How Evenly, and How Quickly?
Maria Glensli et al.
IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS (2018)
Cloud Storage Defense Against Advanced Persistent Threats: A Prospect Theoretic Study
Liang Xiao et al.
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS (2017)
Strategic Trust in Cloud-Enabled Cyber-Physical Systems With an Application to Glucose Control
Jeffrey Pawlick et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2017)
Security as a Service for Cloud-Enabled Internet of Controlled Things Under Advanced Persistent Threats: A Contract Design Approach
Juntao Chen et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2017)
Optimal Impulsive Control of Epidemic Spreading of Heterogeneous Malware
Vladislav Taynitskiy et al.
IFAC PAPERSONLINE (2017)
The optimal dynamic immunization under a controlled heterogeneous node-based SIRS model
Lu-Xing Yang et al.
PHYSICA A-STATISTICAL MECHANICS AND ITS APPLICATIONS (2016)
FlipLeakage: A Game-Theoretic Approach to Protect Against Stealthy Attackers in the Presence of Information Leakage
Sadegh Farhang et al.
DECISION AND GAME THEORY FOR SECURITY, (GAMESEC 2016) (2016)
Epidemic processes in complex networks
Romualdo Pastor-Satorras et al.
REVIEWS OF MODERN PHYSICS (2015)
Threshold FlipThem: When the Winner Does Not Need to Take All
David Leslie et al.
DECISION AND GAME THEORY FOR SECURITY, GAMESEC 2015 (2015)
Differential Game-Based Strategies for Preventing Malware Propagation in Wireless Sensor Networks
Shigen Shen et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2014)
FLIPIT: The Game of Stealthy Takeover
Marten van Dijk et al.
JOURNAL OF CRYPTOLOGY (2013)
Convergence of the forward-backward sweep method in optimal control
Michael McAsey et al.
COMPUTATIONAL OPTIMIZATION AND APPLICATIONS (2012)
A tutorial on the deterministic Impulse Control Maximum Principle: Necessary and sufficient optimality conditions
Mohammed Chahim et al.
EUROPEAN JOURNAL OF OPERATIONAL RESEARCH (2012)