We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 2,181 results
  1. Towards Retentive Proactive Defense Against DeepFakes

    In recent years, with the development of artificial intelligence, many facial manipulation methods based on deep neural networks have been developed,...
    Conference paper 2024
  2. From Passive Defense to Proactive Defence: Strategies and Technologies

    The goal of network defense mechanisms is to enable systems to actively detect and withstand attacks, reduce reliance on external security measures,...
    Chong Shi, Jiahao Peng, ... **aojun Ren in Artificial Intelligence Security and Privacy
    Conference paper 2024
  3. HRPDF: A Software-Based Heterogeneous Redundant Proactive Defense Framework for Programmable Logic Controller

    Programmable logic controllers (PLCs) play a critical role in many industrial control systems, yet face increasingly serious cyber threats. In this...

    Ke Liu, **g-Yi Wang, ... Rui-Long Deng in Journal of Computer Science and Technology
    Article 30 November 2021
  4. Proactive cyber defense through a comprehensive forensic layer for cybercrime attribution

    The extension of digital competences in the ever-changing world of technology has transported global organizations new opportunities like never...

    Rachana Y. Patil, Yogesh H. Patil, ... Aparna Bannore in International Journal of Information Technology
    Article 05 June 2024
  5. Optimal Resource Allocation for Proactive Defense with Deception in Probabilistic Attack Graphs

    This paper investigates the problem of synthesizing proactive defense systems with deception. We model the interaction between the attacker and the...
    Haoxiang Ma, Shuo Han, ... Jie Fu in Decision and Game Theory for Security
    Conference paper 2023
  6. Multi-teacher Universal Distillation Based on Information Hiding for Defense Against Facial Manipulation

    The rapid development of AI-based facial manipulation techniques has made manipulated facial images highly deceptive. These techniques can be misused...

    **n Li, Rongrong Ni, ... Haoliang Li in International Journal of Computer Vision
    Article 08 June 2024
  7. Cost-Effective Defense Timing Selection for Moving Target Defense in Satellite Computing Systems

    Satellite computing system (SCS), with its huge economic value, is suffering from increasing attacks. Moving Target Defense (MTD) can create the...
    Lin Zhang, Yunchuan Guo, ... Liang Fang in Computational Science – ICCS 2024
    Conference paper 2024
  8. Enhancing cloud security: harnessing bayesian game theory for a dynamic defense mechanism

    Security challenges in complex information technologies continue to grow and diversify. To improve network security, many researchers have explored...

    El Mehdi Kandoussi, Adam Houmairi, ... Mostafa Bellafkih in Cluster Computing
    Article 14 June 2024
  9. A Perspicacious Multi-level Defense System Against DDoS Attacks in Cloud Using Information Metric & Game Theoretical Approach

    Distributed Denial of Service (DDoS) attack poses a significant threat to the cloud environment that can impoverish the resource availability, engage...

    M. Mohan, V. Tamizhazhagan, S. Balaji in Journal of Network and Systems Management
    Article 03 October 2023
  10. Anomaly detection and defense techniques in federated learning: a comprehensive review

    In recent years, deep learning methods based on a large amount of data have achieved substantial success in numerous fields. However, with increases...

    Chang Zhang, Shunkun Yang, ... Huansheng Ning in Artificial Intelligence Review
    Article Open access 23 May 2024
  11. Cyber-attack Proactive Defense Using Multivariate Time Series and Machine Learning with Fuzzy Inference-based Decision System

    Cybersecurity incidents have dramatically increased in the recent years. The number of cyber-attack variants is also increasing, thus traditional...
    Rahmoune Bitit, Abdelouahid Derhab, ... Mohamed Belaoued in Machine Learning for Networking
    Conference paper 2023
  12. Assessing the Effectiveness of Deception-Based Cyber Defense with CyberBattleSim

    Deception-Based Cyber Defense technology involves deploying various elements within a network to deliberately mislead and deceive potential...
    Quan Hong, Jiaqi Li, ... Lidong Zhai in Digital Forensics and Cyber Crime
    Conference paper 2024
  13. Proactive Defense

    Throughout my career, I have referenced and used multiple controls frameworks and I am often asked which domains I would choose as my foundation for...
    Jim Seaman in PCI DSS
    Chapter 2020
  14. Decision-Dominant Strategic Defense Against Lateral Movement for 5G Zero-Trust Multi-Domain Networks

    Multi-domain warfare is a military doctrine that leverages capabilities from different domains, including air, land, sea, space, and cyberspace, to...
    Tao Li, Yunian Pan, Quanyan Zhu in Network Security Empowered by Artificial Intelligence
    Chapter 2024
  15. Adaptive Cyber Defense

    Partha Pal, Michael Atighetchi in Encyclopedia of Cryptography, Security and Privacy
    Living reference work entry 2023
  16. RADAMS: Defending Against Proactive Attention Attacks

    Following the definition in Sect. 1.2.3.2 , in this chapter, we identify and formally define a new type of...
    Linan Huang, Quanyan Zhu in Cognitive Security
    Chapter 2023
  17. Defense against adversarial examples based on wavelet domain analysis

    In recent years, machine learning and deep learning, in particular, have shown powerful performance on different challenging tasks. However, research...

    Armaghan Sarvar, Maryam Amirmazlaghani in Applied Intelligence
    Article 18 April 2022
  18. SAND: semi-automated adaptive network defense via programmable rule generation and deployment

    Cyber security is dynamic as defenders often need to adapt their defense postures. The state-of-the-art is that the adaptation of network defense is...

    Haoyu Chen, Deqing Zou, ... Bin Yuan in Science China Information Sciences
    Article 08 February 2022
  19. Towards adding digital forensics capabilities in software defined networking based moving target defense

    Moving Target Defense (MTD) is a security technique for Software Defined Networks (SDN) to change the attack surface constantly. Although MTD is an...

    Muhammad Faraz Hyder, Tasbiha Fatima, Saadia Arshad in Cluster Computing
    Article 24 March 2023
  20. Anomaly-Detection Defense Against Test-Time Evasion Attacks on Robust DNNs

    Deep Neural Networks (DNNs) are now commonly used for the monitoring and control of critical infrastructure, particularly to address classification,...
    Ye Tao, Zhen **ang, ... George Kesidis in Handbook of Dynamic Data Driven Applications Systems
    Chapter 2023
Did you find what you were looking for? Share feedback.