Search
Search Results
-
Towards Retentive Proactive Defense Against DeepFakes
In recent years, with the development of artificial intelligence, many facial manipulation methods based on deep neural networks have been developed,... -
From Passive Defense to Proactive Defence: Strategies and Technologies
The goal of network defense mechanisms is to enable systems to actively detect and withstand attacks, reduce reliance on external security measures,... -
HRPDF: A Software-Based Heterogeneous Redundant Proactive Defense Framework for Programmable Logic Controller
Programmable logic controllers (PLCs) play a critical role in many industrial control systems, yet face increasingly serious cyber threats. In this...
-
Proactive cyber defense through a comprehensive forensic layer for cybercrime attribution
The extension of digital competences in the ever-changing world of technology has transported global organizations new opportunities like never...
-
Optimal Resource Allocation for Proactive Defense with Deception in Probabilistic Attack Graphs
This paper investigates the problem of synthesizing proactive defense systems with deception. We model the interaction between the attacker and the... -
Multi-teacher Universal Distillation Based on Information Hiding for Defense Against Facial Manipulation
The rapid development of AI-based facial manipulation techniques has made manipulated facial images highly deceptive. These techniques can be misused...
-
Cost-Effective Defense Timing Selection for Moving Target Defense in Satellite Computing Systems
Satellite computing system (SCS), with its huge economic value, is suffering from increasing attacks. Moving Target Defense (MTD) can create the... -
Enhancing cloud security: harnessing bayesian game theory for a dynamic defense mechanism
Security challenges in complex information technologies continue to grow and diversify. To improve network security, many researchers have explored...
-
A Perspicacious Multi-level Defense System Against DDoS Attacks in Cloud Using Information Metric & Game Theoretical Approach
Distributed Denial of Service (DDoS) attack poses a significant threat to the cloud environment that can impoverish the resource availability, engage...
-
Anomaly detection and defense techniques in federated learning: a comprehensive review
In recent years, deep learning methods based on a large amount of data have achieved substantial success in numerous fields. However, with increases...
-
Cyber-attack Proactive Defense Using Multivariate Time Series and Machine Learning with Fuzzy Inference-based Decision System
Cybersecurity incidents have dramatically increased in the recent years. The number of cyber-attack variants is also increasing, thus traditional... -
Assessing the Effectiveness of Deception-Based Cyber Defense with CyberBattleSim
Deception-Based Cyber Defense technology involves deploying various elements within a network to deliberately mislead and deceive potential... -
Proactive Defense
Throughout my career, I have referenced and used multiple controls frameworks and I am often asked which domains I would choose as my foundation for... -
Decision-Dominant Strategic Defense Against Lateral Movement for 5G Zero-Trust Multi-Domain Networks
Multi-domain warfare is a military doctrine that leverages capabilities from different domains, including air, land, sea, space, and cyberspace, to... -
-
RADAMS: Defending Against Proactive Attention Attacks
Following the definition in Sect. 1.2.3.2 , in this chapter, we identify and formally define a new type of... -
Defense against adversarial examples based on wavelet domain analysis
In recent years, machine learning and deep learning, in particular, have shown powerful performance on different challenging tasks. However, research...
-
SAND: semi-automated adaptive network defense via programmable rule generation and deployment
Cyber security is dynamic as defenders often need to adapt their defense postures. The state-of-the-art is that the adaptation of network defense is...
-
Towards adding digital forensics capabilities in software defined networking based moving target defense
Moving Target Defense (MTD) is a security technique for Software Defined Networks (SDN) to change the attack surface constantly. Although MTD is an...
-
Anomaly-Detection Defense Against Test-Time Evasion Attacks on Robust DNNs
Deep Neural Networks (DNNs) are now commonly used for the monitoring and control of critical infrastructure, particularly to address classification,...