At present, most network security analysis theory assumes that the players are completely rational. However, this is not consistent with the actual situation. In this paper, based on the effectiveness constraints on both sides with network attack and defense, with the help of stochastic Petri net and evolutionary game theory, the Petri net model of network attack and defense stochastic evolutionary game is reconstructed, the specific definition of the model is given, and the modeling method is given through the network connection relationship and attack and defense strategy set. Using this model, a quantitative analysis of network attack events is carried out to solve a series of indicators related to system security, namely, attack success...
Starting from the actual situation of asymmetric network attack and defense, this paper analyzes the...
Network defenders always face the problem of how to use limited resources to make the most reasonabl...
Network security is a complex and challenging problem. The area of network defense mechanism design ...
In recent years, evolutionary game theory has been gradually applied to analyze and predict network ...
Abstract: The attack actions analysis for Ad Hoc networks can provide a reference for the design sec...
The basic hypothesis of evolutionary game theory is that the players in the game possess limited rat...
Abstract Game-theoretic modeling of computer security views security attack scenarios as an optimiza...
Evolutionary game theory is widely applied in network attack and defense. The existing network attac...
Abstract—As networks become ubiquitous in people’s lives, users depend on networks a lot for suffici...
Abstract. This paper presents a game-theoretic method for analyzing the security of computer network...
This study proposes a stochastic Petri net model for evaluating the security and resilience of cyber...
While there are significant advances in information technology and infrastructure which offer new op...
Abstract—In this paper, we develop an analytical model based on stochastic Petri nets to capture the...
In the multistep attack scenario, each rational attack-defense player tries to maximize his payoff, ...
Most of the cybersecurity research focus on either presenting a specific vulnerability %or hacking t...
Starting from the actual situation of asymmetric network attack and defense, this paper analyzes the...
Network defenders always face the problem of how to use limited resources to make the most reasonabl...
Network security is a complex and challenging problem. The area of network defense mechanism design ...
In recent years, evolutionary game theory has been gradually applied to analyze and predict network ...
Abstract: The attack actions analysis for Ad Hoc networks can provide a reference for the design sec...
The basic hypothesis of evolutionary game theory is that the players in the game possess limited rat...
Abstract Game-theoretic modeling of computer security views security attack scenarios as an optimiza...
Evolutionary game theory is widely applied in network attack and defense. The existing network attac...
Abstract—As networks become ubiquitous in people’s lives, users depend on networks a lot for suffici...
Abstract. This paper presents a game-theoretic method for analyzing the security of computer network...
This study proposes a stochastic Petri net model for evaluating the security and resilience of cyber...
While there are significant advances in information technology and infrastructure which offer new op...
Abstract—In this paper, we develop an analytical model based on stochastic Petri nets to capture the...
In the multistep attack scenario, each rational attack-defense player tries to maximize his payoff, ...
Most of the cybersecurity research focus on either presenting a specific vulnerability %or hacking t...
Starting from the actual situation of asymmetric network attack and defense, this paper analyzes the...
Network defenders always face the problem of how to use limited resources to make the most reasonabl...
Network security is a complex and challenging problem. The area of network defense mechanism design ...