Articles with "attack defense" as a keyword



Photo from wikipedia

A Linearization Method in the “Attack–Defense” Game with Nonhomogeneous Opponent Resources

Sign Up to like & get
recommendations!
Published in 2020 at "Computational Mathematics and Modeling"

DOI: 10.1007/s10598-020-09479-7

Abstract: A nonhomogeneous generalization of the “attack–defense” game is considered. A linearization method is proposed to determine the best guaranteed outcome (BGO) of defense. The linearization utilizes a decomposition of the solution in a small parameter… read more here.

Keywords: attack defense; linearization method; defense; linearization ... See more keywords
Photo from wikipedia

A game-theoretic study of load redistribution attack and defense in power systems

Sign Up to like & get
recommendations!
Published in 2017 at "Electric Power Systems Research"

DOI: 10.1016/j.epsr.2017.05.020

Abstract: Abstract The wide deployment of advanced computer technologies in power systems monitoring and control will inevitably make the power grid more vulnerable to various cyber attacks. Load redistribution (LR) attack is regarded as a typical… read more here.

Keywords: attack; attack defense; power systems; game ... See more keywords
Photo by mluotio83 from unsplash

Markov Differential Game for Network Defense Decision-Making Method

Sign Up to like & get
recommendations!
Published in 2018 at "IEEE Access"

DOI: 10.1109/access.2018.2848242

Abstract: While network attack and defense are experiencing a rapid change, the current research achievements of network security based on traditional game theory fail to characterize the real-time performance of the actual network attack–defense process accurately.… read more here.

Keywords: game; attack defense; network; defense ... See more keywords
Photo from wikipedia

Optimal k Cut-Sets in Attack/Defense Strategies on Networks

Sign Up to like & get
recommendations!
Published in 2020 at "IEEE Access"

DOI: 10.1109/access.2020.3009625

Abstract: The paper investigates the most critical k cut-sets to target in the context of attacks on networks. The targeted network fails if the attack successfully disables a full cut-set. The attack process is dynamic and… read more here.

Keywords: defense strategies; attack defense; cut; optimal cut ... See more keywords
Photo by nampoh from unsplash

Multiontology Construction and Application of Threat Model Based on Adversarial Attack and Defense Under ISO/IEC 27032

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3220637

Abstract: Research pertaining to threat modeling is significant. However, the existing threat modeling methods suffer from ambiguity, heterogeneity and incompleteness; furthermore, the threat models at different abstraction levels are separated from each other, and the model… read more here.

Keywords: attack defense; threat; ontology; multiontology ... See more keywords
Photo from wikipedia

ADFL: A Poisoning Attack Defense Framework for Horizontal Federated Learning

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Industrial Informatics"

DOI: 10.1109/tii.2022.3156645

Abstract: Recently, federated learning has received widespread attention, which will promote the implementation of artificial intelligence technology in various fields. Privacy-preserving technologies are applied to users’ local models to protect users’ privacy. Such operations make the… read more here.

Keywords: horizontal federated; attack defense; federated learning; poisoning attack ... See more keywords
Photo by nampoh from unsplash

Sinkhorn Adversarial Attack and Defense

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Image Processing"

DOI: 10.1109/tip.2022.3180207

Abstract: Adversarial attacks have been extensively investigated in the recent past. Quite interestingly, a majority of these attacks primarily work in the $l_{p}$ space. In this work, we propose a novel approach for generating adversarial samples… read more here.

Keywords: attack defense; sinkhorn adversarial; adversarial attack; defense ... See more keywords
Photo from wikipedia

Multilayered Attack–Defense Model on Networks

Sign Up to like & get
recommendations!
Published in 2019 at "Computational Mathematics and Mathematical Physics"

DOI: 10.1134/s0965542519080128

Abstract: The classical Germeier’s attack–defense game is generalized for the case of defense in depth (multilayered defense) that has a network structure. The generalization is based on the work by Hohzaki and Tanaka. In distinction from… read more here.

Keywords: attack defense; model networks; defense model; multilayered attack ... See more keywords
Photo from wikipedia

MAIAD: A Multistage Asymmetric Information Attack and Defense Model Based on Evolutionary Game Theory

Sign Up to like & get
recommendations!
Published in 2019 at "Symmetry"

DOI: 10.3390/sym11020215

Abstract: With the rapid development and widespread applications of Internet of Things (IoT) systems, the corresponding security issues are getting more and more serious. This paper proposes a multistage asymmetric information attack and defense model (MAIAD)… read more here.

Keywords: asymmetric information; model; attack defense; defense ... See more keywords