Articles with "mimic defense" as a keyword



Photo by homajob from unsplash

Optimal Strategy for Cyberspace Mimic Defense Based on Game Theory

Sign Up to like & get
recommendations!
Published in 2021 at "IEEE Access"

DOI: 10.1109/access.2021.3077075

Abstract: Traditional defensive techniques are usually static and passive, and appear weak to confront highly adaptive and stealthy attacks. As a novel security theory, Cyberspace Mimic Defense (CMD) creates asymmetric uncertainty that favors the defender. CMD… read more here.

Keywords: optimal strategy; theory; strategy; mimic defense ... See more keywords
Photo from wikipedia

An Optimal Seed Scheduling Strategy Algorithm Applied to Cyberspace Mimic Defense

Sign Up to like & get
recommendations!
Published in 2021 at "IEEE Access"

DOI: 10.1109/access.2021.3111735

Abstract: Cyberspace mimic defense (CMD) is an active defense theory that has emerged in recent years. By dynamically constructing and scheduling multiple executors, the CMD can not only effectively defend against security threats caused by unknown… read more here.

Keywords: mimic defense; scheduling strategy; defense; strategy algorithm ... See more keywords