The results of modeling and analysis of scenarios of the behavior of interacting agents in conditions of cyber conflict are presented. General approaches to the development of a scenario of the behavior of antagonistic agents are presented. The definition of the scenario is given and the factors determining the scenario of behavior are highlighted. The given scenarios are determined by such factors as the ratio of the capabilities of the attacking and the defending sides, the presence or absence of information exchange between security agents, and the time of switching to a new attack vector. The value of the time of switching to a new attack vector is found, at which the interaction is more stable. This indicates that the reaction of the d...
Most of the cybersecurity research focus on either presenting a specific vulnerability %or hacking t...
The simplest conceptual model of cybersecurity implicitly views attackers and defenders as acting in...
Our increasing dependence on information technologies and autonomous systems has escalated internati...
The results of modeling and analysis of scenarios of the behavior of interacting agents in condition...
The results of the development of the model of the antagonistic agents behavior in a cyber conflict ...
The basic concepts that form the basis of integrated modeling of the behavior of antagonistic agents...
The rapid development of computer technology, the emergence of modern cyber threats with signs of hy...
The rapid development of computer technology, the emergence of modern cyber threats with signs of hy...
A game-theoretic approach is presented, which claims to be a universal method for solving most probl...
A game-theoretic approach is presented, which claims to be a universal method for solving most probl...
Presently, attackers succeed to damage different cyber systems no matter whether cyber security solu...
Abstract: The article presents a new approach to the research of conflict interaction in c...
Presently, attackers succeed to damage different cyber systems no matter whether cyber security solu...
This study identifies and explains variation in how states behave in the new security environment of...
This study identifies and explains variation in how states behave in the new security environment of...
Most of the cybersecurity research focus on either presenting a specific vulnerability %or hacking t...
The simplest conceptual model of cybersecurity implicitly views attackers and defenders as acting in...
Our increasing dependence on information technologies and autonomous systems has escalated internati...
The results of modeling and analysis of scenarios of the behavior of interacting agents in condition...
The results of the development of the model of the antagonistic agents behavior in a cyber conflict ...
The basic concepts that form the basis of integrated modeling of the behavior of antagonistic agents...
The rapid development of computer technology, the emergence of modern cyber threats with signs of hy...
The rapid development of computer technology, the emergence of modern cyber threats with signs of hy...
A game-theoretic approach is presented, which claims to be a universal method for solving most probl...
A game-theoretic approach is presented, which claims to be a universal method for solving most probl...
Presently, attackers succeed to damage different cyber systems no matter whether cyber security solu...
Abstract: The article presents a new approach to the research of conflict interaction in c...
Presently, attackers succeed to damage different cyber systems no matter whether cyber security solu...
This study identifies and explains variation in how states behave in the new security environment of...
This study identifies and explains variation in how states behave in the new security environment of...
Most of the cybersecurity research focus on either presenting a specific vulnerability %or hacking t...
The simplest conceptual model of cybersecurity implicitly views attackers and defenders as acting in...
Our increasing dependence on information technologies and autonomous systems has escalated internati...