We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 1,358 results
  1. Adaptive Cyber Defense

    Partha Pal, Michael Atighetchi in Encyclopedia of Cryptography, Security and Privacy
    Living reference work entry 2023
  2. CyberDefender: an integrated intelligent defense framework for digital-twin-based industrial cyber-physical systems

    The rise of digital twin-based operational improvements poses a challenge to protecting industrial cyber-physical systems. It is crucial to safeguard...

    S. Krishnaveni, Thomas M. Chen, ... B. Amutha in Cluster Computing
    Article 20 March 2024
  3. Mathematically Modified Adaptive Neuro-Fuzzy Inference System for an Intelligent Cyber Security System

    Cybersecurity is defending sensitive information and crucial systems against Internet attacks. Cyber-Physical Systems (CPS) and the Internet of...

    Divyapushpalakshmi Marimuthu, Ganga Rama Koteswara Rao, ... Devi Mani in SN Computer Science
    Article 17 June 2023
  4. Assessing the Effectiveness of Deception-Based Cyber Defense with CyberBattleSim

    Deception-Based Cyber Defense technology involves deploying various elements within a network to deliberately mislead and deceive potential...
    Quan Hong, Jiaqi Li, ... Lidong Zhai in Digital Forensics and Cyber Crime
    Conference paper 2024
  5. SAND: semi-automated adaptive network defense via programmable rule generation and deployment

    Cyber security is dynamic as defenders often need to adapt their defense postures. The state-of-the-art is that the adaptation of network defense is...

    Haoyu Chen, Deqing Zou, ... Bin Yuan in Science China Information Sciences
    Article 08 February 2022
  6. Cognitive Modeling for Personalized, Adaptive Signaling for Cyber Deception

    This chapter presents an overview of the use of cognitive models for personalized adaptive signaling for cyber deception. It provides a general...
    Christian Lebiere, Edward A. Cranford, ... Cleotilde Gonzalez in Cyber Deception
    Chapter 2023
  7. Autonomous Intelligent Cyber-defense Agent: Introduction and Overview

    This chapter introduces the concept of Autonomous Intelligent Cyber-defense Agents (AICAs), and briefly explains the importance of this field and the...
    Chapter 2023
  8. Method for the Adaptive Neutralization of Structural Breaches in Cyber-Physical Systems Based on Graph Artificial Neural Networks

    Abstract

    This paper presents a model of threats in cyber-physical systems (CPSs) with examples of attacks and potential negative consequences for...

    E. B. Aleksandrova, A. A. Shtyrkina in Automatic Control and Computer Sciences
    Article 01 December 2023
  9. Cyber range design framework for cyber security education and training

    The need for effective training of cyber security personnel working in critical infrastructures and in the corporate has brought attention to the...

    M. N. Katsantonis, A. Manikas, ... D. Gritzalis in International Journal of Information Security
    Article Open access 18 March 2023
  10. Tracing the evolution of cyber resilience: a historical and conceptual review

    In 2000, during a time when cyber security research was focused on the risks and threats posed by digital systems, the notion of being able to...

    Vasiliki Tzavara, Savvas Vassiliadis in International Journal of Information Security
    Article Open access 01 February 2024
  11. Triple methods-based empirical assessment of the effectiveness of adaptive cyber defenses in the cloud

    The flexible and cost-effective service provided by cloud computing has led to the development of a vast array of applications in smart cities....

    **n Yang, Abla Smahi, ... Shuo-Yen Robert Li in The Journal of Supercomputing
    Article 23 December 2022
  12. Study of smart grid cyber-security, examining architectures, communication networks, cyber-attacks, countermeasure techniques, and challenges

    Smart Grid (SG) technology utilizes advanced network communication and monitoring technologies to manage and regulate electricity generation and...

    Batoul Achaal, Mehdi Adda, ... Ali Awde in Cybersecurity
    Article Open access 02 May 2024
  13. Honeypot Based Industrial Threat Detection Using Game Theory in Cyber-Physical System

    Cyber threats are clearly understood across the security landscape using honeypot technologies across industrial cyber-physical systems (ICPS)....

    **angming Zhou, Laila Almutairi, ... Mohammad Nazir Ahmad in Journal of Grid Computing
    Article 27 October 2023
  14. Adaptive Cyberdefense with Deception: A Human–AI Cognitive Approach

    Achieving a level of dynamic and adaptive autonomy in cyber defense is highly desirable to advance the capabilities of cyber defense to a whole new...
    Cleotilde Gonzalez, Palvi Aggarwal, ... Christian Lebiere in Cyber Deception
    Chapter 2023
  15. Perception of Cyber Threats

    This chapter presents an approach to improve cyber threat perception using Autonomous Intelligent Cyber-defence Agents (AICA). Recent research has...
    Kevin Kornegay, Kofi Nyarko, ... Ahmad Ridley in Autonomous Intelligent Cyber Defense Agent (AICA)
    Chapter 2023
  16. Security strategy for autonomous vehicle cyber-physical systems using transfer learning

    Cyber-physical systems (CPSs) are emergent systems that enable effective real-time communication and collaboration (C&C) of physical components such...

    Abdulaziz A. Alsulami, Qasem Abu Al-Haija, ... Raed Alsini in Journal of Cloud Computing
    Article Open access 20 December 2023
  17. From scattered data to actionable knowledge: flexible cyber security reporting in the military domain

    Numerous cyber situational awareness models have been proposed in recent years. Yet, one of the main challenges still remains mostly unsolved, which...

    Florian Skopik, Arndt Bonitz, ... Günter Göhler in International Journal of Information Security
    Article Open access 14 September 2022
  18. Security Algorithm for Intelligent Transport System in Cyber-Physical Systems Perceptive: Attacks, Vulnerabilities, and Countermeasures

    Upcoming technological innovations and findings are immense in the field of intelligent transport systems (ITS). Cyber-physical systems (CPSs) are...

    R. Pavithra, Vishnu kumar Kaliappan, Sivaramakrishnan Rajendar in SN Computer Science
    Article 29 July 2023
  19. Classifying resilience approaches for protecting smart grids against cyber threats

    Smart grids (SG) draw the attention of cyber attackers due to their vulnerabilities, which are caused by the usage of heterogeneous communication...

    Andrew D. Syrmakesis, Cristina Alcaraz, Nikos D. Hatziargyriou in International Journal of Information Security
    Article Open access 06 May 2022
  20. POSTER: Adaptive Moving Target Defense: Enhancing Dynamic Perturbation Through Voltage Sensitivity Analysis in Power Systems

    Moving target defense (MTD) strategies significantly protect power systems against stealthy false data injection attacks. However, traditional MTD...
    Muhammad Nouman Nafees, Neetesh Saxena, Pete Burnap in Applied Cryptography and Network Security Workshops
    Conference paper 2023
Did you find what you were looking for? Share feedback.