Moving Target Defense II Application of Game Theory and Adversarial Modeling /
Our cyber defenses are static and are governed by lengthy processes, e.g., for testing and security patch deployment.� Adversaries could plan their attacks carefully over time and launch attacks at cyber speeds at any given moment.� We need a new class of defensive strategies that would force advers...
Corporate Author: | SpringerLink (Online service) |
---|---|
Other Authors: | Jajodia, Sushil. (Editor), Ghosh, Anup K. (Editor), Subrahmanian, V.S. (Editor), Swarup, Vipin. (Editor), Wang, Cliff. (Editor), Wang, X. Sean. (Editor) |
Format: | Electronic |
Language: | English |
Published: |
New York, NY :
Springer New York : Imprint: Springer,
2013.
|
Series: | Advances in Information Security,
100 |
Subjects: | |
Online Access: | https://ezaccess.library.uitm.edu.my/login?url=http://dx.doi.org/10.1007/978-1-4614-5416-8 |
Similar Items
-
Malware analysis and detection engineering : a comprehensive approach to detect and analyze modern malware /
by: Mohanta, Abhijit,, et al.
Published: (2020) -
Computer and communication engineering : first International Conference, ICCCE 2018, Guayaquil, Ecuador, October 25-27, 2018, proceedings /
Published: (2019) -
The impact of service oriented architecture adoption on organizations /
by: Niknejad, Naghmeh,, et al.
Published: (2019) -
Internet infrastructure : networking, web services, and cloud computing /
by: Fox, Richard, 1964-, et al.
Published: (2018) -
Communication systems principles using MATLAB /
by: Leis, John W.,
Published: (2018)