Articles with "persistent threats" as a keyword



Photo from wikipedia

Handling of advanced persistent threats and complex incidents in healthcare, transportation and energy ICT infrastructures

Sign Up to like & get
recommendations!
Published in 2021 at "Evolving Systems"

DOI: 10.1007/s12530-020-09335-4

Abstract: In recent years, the use of information technologies in Critical Infrastructures is gradually increasing. Although this brings benefits, it also increases the possibility of security attacks. Despite the availability of various advanced incident handling techniques… read more here.

Keywords: persistent threats; handling advanced; threats complex; incidents healthcare ... See more keywords
Photo from academic.microsoft.com

An adaptive defense mechanism to prevent advanced persistent threats

Sign Up to like & get
recommendations!
Published in 2021 at "Connection Science"

DOI: 10.1080/09540091.2020.1832960

Abstract: The expansion of information technology infrastructure is encountered with Advanced Persistent Threats (APTs), which can launch data destruction, disclosure, modification, and/or Denial of Service attacks by drawing upon vulnerabilities of software and hardware. Moving Target… read more here.

Keywords: persistent threats; defense; adaptive defense; advanced persistent ... See more keywords
Photo from wikipedia

Evolutionary Game Theoretic Analysis of Advanced Persistent Threats Against Cloud Storage

Sign Up to like & get
recommendations!
Published in 2017 at "IEEE Access"

DOI: 10.1109/access.2017.2691326

Abstract: Advanced Persistent Threats (APTs) represent stealthy, powerful, long-term, and well-funded attacks against cyber systems, such as data centers and cloud storage. Evolutionary game theory is used to capture the long-term continuous behavior of the APTs… read more here.

Keywords: storage; persistent threats; game; evolutionary game ... See more keywords
Photo from wikipedia

Dynamic Resource Management to Defend Against Advanced Persistent Threats in Fog Computing: A Game Theoretic Approach

Sign Up to like & get
recommendations!
Published in 2021 at "IEEE Transactions on Cloud Computing"

DOI: 10.1109/tcc.2019.2896632

Abstract: Fog computing has gained tremendous popularity due to its capability of addressing the surging demand on high-quality ubiquitous mobile services. Nevertheless, the highly virtualized environment in fog computing leads to vulnerability to cyber attacks such… read more here.

Keywords: cyber; persistent threats; advanced persistent; fog computing ... See more keywords
Photo by alterego_swiss from unsplash

A Game-Theoretic Method for Defending Against Advanced Persistent Threats in Cyber Systems

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Transactions on Information Forensics and Security"

DOI: 10.1109/tifs.2022.3229595

Abstract: Advanced persistent threats (APTs) are one of today’s major threats to cyber security. Highly determined attackers along with novel and evasive exfiltration techniques mean APT attacks elude most intrusion detection and prevention systems. The result… read more here.

Keywords: information; persistent threats; advanced persistent; game ... See more keywords
Photo by mluotio83 from unsplash

Stackelberg-Game-Based Defense Analysis Against Advanced Persistent Threats on Cloud Control System

Sign Up to like & get
recommendations!
Published in 2020 at "IEEE Transactions on Industrial Informatics"

DOI: 10.1109/tii.2019.2925035

Abstract: In this paper, the security problem for a cloud control system (CCS) is studied. In the CCS, so-called advanced persistent threats (APTs) can be launched by a malicious attacker to reduce the quality of service… read more here.

Keywords: persistent threats; system; stackelberg game; control system ... See more keywords

Defending Against Advanced Persistent Threats Using Game-Theory

Sign Up to like & get
recommendations!
Published in 2017 at "PLoS ONE"

DOI: 10.1371/journal.pone.0168675

Abstract: Advanced persistent threats (APT) combine a variety of different attack forms ranging from social engineering to technical exploits. The diversity and usual stealthiness of APT turns them into a central problem of contemporary practical system… read more here.

Keywords: game; persistent threats; system; advanced persistent ... See more keywords
Photo by campaign_creators from unsplash

Expert knowledge and data analysis for detecting advanced persistent threats

Sign Up to like & get
recommendations!
Published in 2017 at "Open Mathematics"

DOI: 10.1515/math-2017-0094

Abstract: Abstract Critical Infrastructures in public administration would be compromised by Advanced Persistent Threats (APT) which today constitute one of the most sophisticated ways of stealing information. This paper presents an effective, learning based tool that… read more here.

Keywords: persistent threats; knowledge data; data analysis; expert knowledge ... See more keywords
Photo from wikipedia

Complementary Approaches to Instructable Agents for Advanced Persistent Threats Detection

Sign Up to like & get
recommendations!
Published in 2020 at "Studies in Informatics and Control"

DOI: 10.24846/v29i3y202001

Abstract: Large CSOCs (cybersecurity operation centers) must analyze tens of thousands of security incidents per day. Not only that there are not enough cybersecurity analysts available but the average cost of a cybersecurity analyst keeps going… read more here.

Keywords: complementary approaches; persistent threats; cybersecurity; advanced persistent ... See more keywords