Autonomic Computer Network Defence aims to achieve self-protection capability of IT networks in order to limit the risk caused by malicious and accidental events. To achieve this, networks require an automated controller with a policy, which allows selecting the most appropriate action in any undesired network state. Due to the complexity and constant evolution of the Computer Network Defence environment, a-priori design of an automated controller is not effective. A solution for generating and continuously improving decision policies is needed. A significant technical challenge in Autonomic Computer Network Defence is finding a strategy to efficiently generate, trial and compare different policies and retain the best performing one. To add...
Computer networks, widely used by enterprises and individuals nowadays, are still vulnerable when fa...
This article investigates the secure control problem for cyber-physical systems when the malicious d...
The existing network attack and defense method can be regarded as game, but most of the game only in...
In recent years, cyber attacks have shown diversified, purposeful, and organized characteristics, wh...
This work addresses the functional approach to ensuring cyber resiliency as a kind of adaptive secur...
This paper focuses on cyber-security simulations in networks modeled as a Markov game with incomplet...
This paper presents a control strategy for CyberPhysical System defense developed in the framework o...
This paper focuses on cyber-security simulations in networks modeled as a Markov game with incomplet...
Early threat detection is an increasing part of the cybersecurity landscape, given the growing scale...
In this research, we investigate the reinforcement learning-based control strategy for second-order ...
In the current ever-changing cybersecurity scenario, active cyber defense strategies are imperative....
Cyber vulnerability management is a critical function performed by a cybersecurity operations center...
Cybersecurity simulations can offer deep insights into the behavior of agents in the battle to secur...
The existing cyberspace attack and defense method can be regarded as game, but most of the game only...
Detection of malicious behavior is a fundamental problem in security. One of the major challenges in...
Computer networks, widely used by enterprises and individuals nowadays, are still vulnerable when fa...
This article investigates the secure control problem for cyber-physical systems when the malicious d...
The existing network attack and defense method can be regarded as game, but most of the game only in...
In recent years, cyber attacks have shown diversified, purposeful, and organized characteristics, wh...
This work addresses the functional approach to ensuring cyber resiliency as a kind of adaptive secur...
This paper focuses on cyber-security simulations in networks modeled as a Markov game with incomplet...
This paper presents a control strategy for CyberPhysical System defense developed in the framework o...
This paper focuses on cyber-security simulations in networks modeled as a Markov game with incomplet...
Early threat detection is an increasing part of the cybersecurity landscape, given the growing scale...
In this research, we investigate the reinforcement learning-based control strategy for second-order ...
In the current ever-changing cybersecurity scenario, active cyber defense strategies are imperative....
Cyber vulnerability management is a critical function performed by a cybersecurity operations center...
Cybersecurity simulations can offer deep insights into the behavior of agents in the battle to secur...
The existing cyberspace attack and defense method can be regarded as game, but most of the game only...
Detection of malicious behavior is a fundamental problem in security. One of the major challenges in...
Computer networks, widely used by enterprises and individuals nowadays, are still vulnerable when fa...
This article investigates the secure control problem for cyber-physical systems when the malicious d...
The existing network attack and defense method can be regarded as game, but most of the game only in...