Moving Target Defense II Application of Game Theory and Adversarial Modeling /
Our cyber defenses are static and are governed by lengthy processes, e.g., for testing and security patch deployment.� Adversaries could plan their attacks carefully over time and launch attacks at cyber speeds at any given moment.� We need a new class of defensive strategies that would force advers...
Corporate Author: | |
---|---|
Other Authors: | , , , , , |
Format: | Electronic |
Language: | English |
Published: |
New York, NY :
Springer New York : Imprint: Springer,
2013.
|
Series: | Advances in Information Security,
100 |
Subjects: | |
Online Access: | https://ezaccess.library.uitm.edu.my/login?url=http://dx.doi.org/10.1007/978-1-4614-5416-8 |