Abstract—A significant limitation of current cyber security research and techniques is its reactive and applied nature. This leads to a continuous ‘cyber cycle ’ of attackers scanning networks, developing exploits and attacking systems, with defend-ers detecting attacks, analyzing exploits and patching systems. This reactive nature leaves sensitive systems highly vulnerable to attack due to un-patched systems and undetected exploits. Some current research attempts to address this major limitation by introducing systems that implement moving target defense. However, these ideas are typically based on the intuition that a moving target defense will make it much harder for attackers to find and scan vulnerable systems, and not on theoretical m...
In the new cyber landscape, the legal rules apply only to defenders. Even nonprimary countries and c...
Operation technology originally used the concepts of isolation, obscurity, and limited physical acce...
Cybersecurity is an active and important area of study, practice, and research today. It spans vario...
This special issue provides an introduction to cyberphysical security of networked control systems (...
This paper presents a game-theoretic model, which analyzes Moving-Target Defense in Cyber-Physical S...
Abstract— The traditional technologies, tools and procedures of any network cannot be protected from...
This article investigates the secure control problem for cyber-physical systems when the malicious d...
The progressively ubiquitous connectivity in the present information systems pose newer challenges t...
Reactive defense mechanisms, such as intrusion detection systems, have made significant efforts to s...
Contemporary security is increasingly concerned with and affected by actions undertaken via cyberspa...
A game-theoretic approach is presented, which claims to be a universal method for solving most probl...
We examine coordination dilemmas in cybersecurity policy by using an already developed evolutionary ...
Cyber-attacks targeting individuals and enterprises have become a predominant part of the computer/i...
As an active defense technique to change asymmetry in cyberattack-defense confrontation, moving targ...
My research addresses the problem faced by a defender who must screen objects for potential threats ...
In the new cyber landscape, the legal rules apply only to defenders. Even nonprimary countries and c...
Operation technology originally used the concepts of isolation, obscurity, and limited physical acce...
Cybersecurity is an active and important area of study, practice, and research today. It spans vario...
This special issue provides an introduction to cyberphysical security of networked control systems (...
This paper presents a game-theoretic model, which analyzes Moving-Target Defense in Cyber-Physical S...
Abstract— The traditional technologies, tools and procedures of any network cannot be protected from...
This article investigates the secure control problem for cyber-physical systems when the malicious d...
The progressively ubiquitous connectivity in the present information systems pose newer challenges t...
Reactive defense mechanisms, such as intrusion detection systems, have made significant efforts to s...
Contemporary security is increasingly concerned with and affected by actions undertaken via cyberspa...
A game-theoretic approach is presented, which claims to be a universal method for solving most probl...
We examine coordination dilemmas in cybersecurity policy by using an already developed evolutionary ...
Cyber-attacks targeting individuals and enterprises have become a predominant part of the computer/i...
As an active defense technique to change asymmetry in cyberattack-defense confrontation, moving targ...
My research addresses the problem faced by a defender who must screen objects for potential threats ...
In the new cyber landscape, the legal rules apply only to defenders. Even nonprimary countries and c...
Operation technology originally used the concepts of isolation, obscurity, and limited physical acce...
Cybersecurity is an active and important area of study, practice, and research today. It spans vario...