Adaptive Autonomous Secure Cyber Systems最新文献

筛选
英文 中文
Reference Architecture of an Autonomous Agent for Cyber Defense of Complex Military Systems 复杂军事系统网络防御的自主代理参考体系结构
Adaptive Autonomous Secure Cyber Systems Pub Date : 2020-02-05 DOI: 10.1007/978-3-030-33432-1_1
P. Théron, A. Kott, Martin Drasar, K. Rządca, Benoît Leblanc, Mauno Pihelgas, L. Mancini, Fabio De Gaspari
{"title":"Reference Architecture of an Autonomous Agent for Cyber Defense of Complex Military Systems","authors":"P. Théron, A. Kott, Martin Drasar, K. Rządca, Benoît Leblanc, Mauno Pihelgas, L. Mancini, Fabio De Gaspari","doi":"10.1007/978-3-030-33432-1_1","DOIUrl":"https://doi.org/10.1007/978-3-030-33432-1_1","url":null,"abstract":"","PeriodicalId":273193,"journal":{"name":"Adaptive Autonomous Secure Cyber Systems","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124261838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Defending against Machine Learning based Inference Attacks via Adversarial Examples: Opportunities and Challenges 通过对抗性示例防御基于机器学习的推理攻击:机遇与挑战
Adaptive Autonomous Secure Cyber Systems Pub Date : 2019-09-17 DOI: 10.1007/978-3-030-33432-1_2
Jinyuan Jia, N. Gong
{"title":"Defending against Machine Learning based Inference Attacks via Adversarial Examples: Opportunities and Challenges","authors":"Jinyuan Jia, N. Gong","doi":"10.1007/978-3-030-33432-1_2","DOIUrl":"https://doi.org/10.1007/978-3-030-33432-1_2","url":null,"abstract":"","PeriodicalId":273193,"journal":{"name":"Adaptive Autonomous Secure Cyber Systems","volume":"240 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114420764","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Strategic Learning for Active, Adaptive, and Autonomous Cyber Defense 主动、自适应和自主网络防御的战略学习
Adaptive Autonomous Secure Cyber Systems Pub Date : 2019-07-01 DOI: 10.1007/978-3-030-33432-1_10
Linan Huang, Quanyan Zhu
{"title":"Strategic Learning for Active, Adaptive, and Autonomous Cyber Defense","authors":"Linan Huang, Quanyan Zhu","doi":"10.1007/978-3-030-33432-1_10","DOIUrl":"https://doi.org/10.1007/978-3-030-33432-1_10","url":null,"abstract":"","PeriodicalId":273193,"journal":{"name":"Adaptive Autonomous Secure Cyber Systems","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125520063","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Plan Interdiction Games 计划拦截游戏
Adaptive Autonomous Secure Cyber Systems Pub Date : 2018-11-15 DOI: 10.1007/978-3-030-33432-1_8
Yevgeniy Vorobeychik, M. Pritchard
{"title":"Plan Interdiction Games","authors":"Yevgeniy Vorobeychik, M. Pritchard","doi":"10.1007/978-3-030-33432-1_8","DOIUrl":"https://doi.org/10.1007/978-3-030-33432-1_8","url":null,"abstract":"","PeriodicalId":273193,"journal":{"name":"Adaptive Autonomous Secure Cyber Systems","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129473335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Phishing URL Detection with Lexical Features and Blacklisted Domains 网络钓鱼URL检测与词汇特征和黑名单域
Adaptive Autonomous Secure Cyber Systems Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-33432-1_12
Jiwon Hong, Taeri Kim, Jing Liu, Noseong Park, Sang-Wook Kim
{"title":"Phishing URL Detection with Lexical Features and Blacklisted Domains","authors":"Jiwon Hong, Taeri Kim, Jing Liu, Noseong Park, Sang-Wook Kim","doi":"10.1007/978-3-030-33432-1_12","DOIUrl":"https://doi.org/10.1007/978-3-030-33432-1_12","url":null,"abstract":"","PeriodicalId":273193,"journal":{"name":"Adaptive Autonomous Secure Cyber Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129005312","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
Automated Cyber Risk Mitigation: Making Informed Cost-Effective Decisions 自动化网络风险缓解:做出明智的成本效益决策
Adaptive Autonomous Secure Cyber Systems Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-33432-1_7
Mohammed Noraden Alsaleh, E. Al-Shaer
{"title":"Automated Cyber Risk Mitigation: Making Informed Cost-Effective Decisions","authors":"Mohammed Noraden Alsaleh, E. Al-Shaer","doi":"10.1007/978-3-030-33432-1_7","DOIUrl":"https://doi.org/10.1007/978-3-030-33432-1_7","url":null,"abstract":"","PeriodicalId":273193,"journal":{"name":"Adaptive Autonomous Secure Cyber Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130354069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Online Learning Methods for Controlling Dynamic Cyber Deception Strategies 控制动态网络欺骗策略的在线学习方法
Adaptive Autonomous Secure Cyber Systems Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-33432-1_11
Marcus Gutierrez, Christopher Kiekintveld
{"title":"Online Learning Methods for Controlling Dynamic Cyber Deception Strategies","authors":"Marcus Gutierrez, Christopher Kiekintveld","doi":"10.1007/978-3-030-33432-1_11","DOIUrl":"https://doi.org/10.1007/978-3-030-33432-1_11","url":null,"abstract":"","PeriodicalId":273193,"journal":{"name":"Adaptive Autonomous Secure Cyber Systems","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117061751","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Game Theoretic Cyber Deception to Foil Adversarial Network Reconnaissance 对抗网络侦察的博弈论网络欺骗
Adaptive Autonomous Secure Cyber Systems Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-33432-1_9
Aaron Schlenker, Omkar Thakoor, Haifeng Xu, Fei Fang, Milind Tambe, P. Vayanos
{"title":"Game Theoretic Cyber Deception to Foil Adversarial Network Reconnaissance","authors":"Aaron Schlenker, Omkar Thakoor, Haifeng Xu, Fei Fang, Milind Tambe, P. Vayanos","doi":"10.1007/978-3-030-33432-1_9","DOIUrl":"https://doi.org/10.1007/978-3-030-33432-1_9","url":null,"abstract":"","PeriodicalId":273193,"journal":{"name":"Adaptive Autonomous Secure Cyber Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122556595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Can Cyber Operations Be Made Autonomous? An Answer from the Situational Awareness Viewpoint 网络作战能否实现自主化?从态势感知的角度回答
Adaptive Autonomous Secure Cyber Systems Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-33432-1_4
Chen Zhong, J. Yen, Peng Liu
{"title":"Can Cyber Operations Be Made Autonomous? An Answer from the Situational Awareness Viewpoint","authors":"Chen Zhong, J. Yen, Peng Liu","doi":"10.1007/978-3-030-33432-1_4","DOIUrl":"https://doi.org/10.1007/978-3-030-33432-1_4","url":null,"abstract":"","PeriodicalId":273193,"journal":{"name":"Adaptive Autonomous Secure Cyber Systems","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132918686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Framework for Studying Autonomic Computing Models in Cyber Deception 网络欺骗中自主计算模型的研究框架
Adaptive Autonomous Secure Cyber Systems Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-33432-1_5
S. Venkatesan, Shridatt Sugrim, Jason A. Youzwak, C. Chiang, R. Chadha
{"title":"A Framework for Studying Autonomic Computing Models in Cyber Deception","authors":"S. Venkatesan, Shridatt Sugrim, Jason A. Youzwak, C. Chiang, R. Chadha","doi":"10.1007/978-3-030-33432-1_5","DOIUrl":"https://doi.org/10.1007/978-3-030-33432-1_5","url":null,"abstract":"","PeriodicalId":273193,"journal":{"name":"Adaptive Autonomous Secure Cyber Systems","volume":"2014 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114557651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信