The Internet is a man-made complex system under constant attacks (e.g., Advanced Persistent Threats and malwares). It is therefore important to understand the phenomena that can be induced by the interaction between cyber attacks and cyber defenses. In this paper, we explore the rich phenomena that can be exhibited when the de-fender employs active defense to combat cyber attacks. To the best of our knowledge, this is the first study that shows that active cyber defense dynamics (or more generally, cybersecurity dynamics) can exhibit the bifurcation and chaos phenomena. This has profound implications for cyber security measurement and prediction: (i) it is infeasible (or even impossible) to accurately measure and predict cyber security unde...
The results of the development of the model of the antagonistic agents behavior in a cyber conflict ...
This article investigates the secure control problem for cyber-physical systems when the malicious d...
Active cyber defense (ACD) is an important but ill-defined concept in cyber security. This Trend Ana...
We study the consequences of cyberattack, defense, and recovery in systems for which a physical syst...
Moving Target Defense (MTD) can enhance the resilience of cyber systems against attacks. Although th...
Abstract. The concept of active cyber defense has appeared in the literature in recent years. Howeve...
Abstract—A significant limitation of current cyber security research and techniques is its reactive ...
The technological innovation of cyber systems and increase dependence of individuals, societies and ...
Cyber security has become a serious challenge for organizations due to growing use of the Internet a...
Tendensions of computer incidents development, evolving vulnerability of information systems, indent...
Advanced persistent threats (APTs) pose a grave threat to cyberspace, because they deactivate all th...
Cyber-attacks targeting individuals and enterprises have become a predominant part of the computer/i...
In the new cyber landscape, the legal rules apply only to defenders. Even nonprimary countries and c...
Thesis (Ph.D.)--University of Washington, 2016-08Cyber systems form the backbone of our society, ser...
Cyber-attacks have become inevitable in modern day society. Therefore, the occurrence of cyber-attac...
The results of the development of the model of the antagonistic agents behavior in a cyber conflict ...
This article investigates the secure control problem for cyber-physical systems when the malicious d...
Active cyber defense (ACD) is an important but ill-defined concept in cyber security. This Trend Ana...
We study the consequences of cyberattack, defense, and recovery in systems for which a physical syst...
Moving Target Defense (MTD) can enhance the resilience of cyber systems against attacks. Although th...
Abstract. The concept of active cyber defense has appeared in the literature in recent years. Howeve...
Abstract—A significant limitation of current cyber security research and techniques is its reactive ...
The technological innovation of cyber systems and increase dependence of individuals, societies and ...
Cyber security has become a serious challenge for organizations due to growing use of the Internet a...
Tendensions of computer incidents development, evolving vulnerability of information systems, indent...
Advanced persistent threats (APTs) pose a grave threat to cyberspace, because they deactivate all th...
Cyber-attacks targeting individuals and enterprises have become a predominant part of the computer/i...
In the new cyber landscape, the legal rules apply only to defenders. Even nonprimary countries and c...
Thesis (Ph.D.)--University of Washington, 2016-08Cyber systems form the backbone of our society, ser...
Cyber-attacks have become inevitable in modern day society. Therefore, the occurrence of cyber-attac...
The results of the development of the model of the antagonistic agents behavior in a cyber conflict ...
This article investigates the secure control problem for cyber-physical systems when the malicious d...
Active cyber defense (ACD) is an important but ill-defined concept in cyber security. This Trend Ana...