Sign Up to like & get
recommendations!
0
Published in 2019 at "IEEE Transactions on Information Forensics and Security"
DOI: 10.1109/tifs.2019.2912551
Abstract: In cyberspace, evolutionary strategies are commonly used by both attackers and defenders. For example, an attacker’s strategy often changes over the course of time, as new vulnerabilities are discovered and/or mitigated. Similarly, a defender’s strategy…
read more here.
Keywords:
metrics towards;
agility;
measuring cyber;
cyber agility ... See more keywords