Moving Target Defense II Application of Game Theory and Adversarial Modeling /

Our cyber defenses are static and are governed by lengthy processes, e.g., for testing and security patch deployment.� Adversaries could plan their attacks carefully over time and launch attacks at cyber speeds at any given moment.� We need a new class of defensive strategies that would force advers...

Full description

Bibliographic Details
Corporate Author: SpringerLink (Online service)
Other Authors: Jajodia, Sushil. (Editor), Ghosh, Anup K. (Editor), Subrahmanian, V.S. (Editor), Swarup, Vipin. (Editor), Wang, Cliff. (Editor), Wang, X. Sean. (Editor)
Format: Electronic
Language:English
Published: New York, NY : Springer New York : Imprint: Springer, 2013.
Series:Advances in Information Security, 100
Subjects:
Online Access:https://ezaccess.library.uitm.edu.my/login?url=http://dx.doi.org/10.1007/978-1-4614-5416-8