Cyber security is increasingly a challenge for organizations everywhere. Defense systems that require less expert knowledge and can adapt quickly to threats are strongly needed to combat the rise of cyber attacks. Computational intelligence techniques can be used to rapidly explore potential solutions while searching in a way that is unaffected by human bias. Several architectures have been created for developing and testing systems used in network security, but most are meant to provide a platform for running cyber security experiments as opposed to automating experiment processes. In the first paper, we propose a framework termed Distributed Cyber Security Automation Framework for Experiments (DCAFE) that enables experiment automation and...
In a constantly and intricately connected world that is going digital, cybersecurity is imperative t...
This paper focuses on cyber-security simulations in networks modeled as a Markov game with incomplet...
This dissertation presents automated methods based on behavioral game theory and model checking to i...
Cyber security is increasingly a challenge for organizations everywhere. Defense systems that requir...
Predicting an adversary\u27s capabilities, intentions, and probable vectors of attack is in general ...
Cyber-attacks targeting individuals and enterprises have become a predominant part of the computer/i...
This electronic version was submitted by the student author. The certified thesis is available in th...
The resiliency of systems integrated through cyber networks is of utmost importance due to the relia...
Cyber attacks are compromising networks faster than administrators can respond. Network defenders ar...
Cybersecurity simulations can offer deep insights into the behavior of agents in the battle to secur...
The information domain is quickly emerging as a dominant space where adversaries covertly conduct cy...
Proceedings of the 13th International Conference on Cyber Warfare and Security ICCWS 2018; Hosted By...
erimeter based defenses are limited in deterring and defeating cyberattacks. Multi-layered approache...
While Artificial Intelligence (AI) has tremendous potential as a defense against real-world cybersec...
As society advances in terms of information technology, the dependency on cyber secure systems incre...
In a constantly and intricately connected world that is going digital, cybersecurity is imperative t...
This paper focuses on cyber-security simulations in networks modeled as a Markov game with incomplet...
This dissertation presents automated methods based on behavioral game theory and model checking to i...
Cyber security is increasingly a challenge for organizations everywhere. Defense systems that requir...
Predicting an adversary\u27s capabilities, intentions, and probable vectors of attack is in general ...
Cyber-attacks targeting individuals and enterprises have become a predominant part of the computer/i...
This electronic version was submitted by the student author. The certified thesis is available in th...
The resiliency of systems integrated through cyber networks is of utmost importance due to the relia...
Cyber attacks are compromising networks faster than administrators can respond. Network defenders ar...
Cybersecurity simulations can offer deep insights into the behavior of agents in the battle to secur...
The information domain is quickly emerging as a dominant space where adversaries covertly conduct cy...
Proceedings of the 13th International Conference on Cyber Warfare and Security ICCWS 2018; Hosted By...
erimeter based defenses are limited in deterring and defeating cyberattacks. Multi-layered approache...
While Artificial Intelligence (AI) has tremendous potential as a defense against real-world cybersec...
As society advances in terms of information technology, the dependency on cyber secure systems incre...
In a constantly and intricately connected world that is going digital, cybersecurity is imperative t...
This paper focuses on cyber-security simulations in networks modeled as a Markov game with incomplet...
This dissertation presents automated methods based on behavioral game theory and model checking to i...