Zobrazeno 1 - 10
of 26
pro vyhledávání: '"Ahmed H. Anwar"'
Publikováno v:
IEEE Transactions on Network and Service Management. 19:3438-3452
Publikováno v:
IEEE Transactions on Network and Service Management. 19:112-129
Defensive deception techniques have emerged as a promising proactive defense mechanism to mislead an attacker and thereby achieve attack failure. However, most game-theoretic defensive deception approaches have assumed that players maintain consisten
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783031263682
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::3c6dc0bd6146a3a7f5822a1ad4c6b9bc
https://doi.org/10.1007/978-3-031-26369-9_3
https://doi.org/10.1007/978-3-031-26369-9_3
Autor:
Olivier Tsemogne, Willie Kouam, Ahmed H. Anwar, Yezekael Hayel, Charles Kamhoua, Gabriel Deugoué
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783031263682
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::0fb4a463aa67a422dc0cb12a59fc5c07
https://doi.org/10.1007/978-3-031-26369-9_13
https://doi.org/10.1007/978-3-031-26369-9_13
Publikováno v:
GLOBECOM 2022 - 2022 IEEE Global Communications Conference.
Publikováno v:
Game Theory and Machine Learning for Cyber Security
In this chapter, we introduce a cyber deception defense approach and propose a scalable allocation algorithm to place honeypots over an attack graph. We formulate a two‐person zero‐sum strategic game between the network defender and an attacker.
Publikováno v:
IEEE Transactions on Cloud Computing. 9:854-867
In a multi-tenant cloud, a number of Virtual Machines (VMs) are collocated on the same physical machine to optimize performance, power consumption and maximize profit. This, however, increases the risk of a malicious VM performing side-channel attack
Publikováno v:
IEEE Communications Surveys & Tutorials. 23:2460-2493
Defensive deception is a promising approach for cyber defense. Via defensive deception, a defender can anticipate and prevent attacks by misleading or luring an attacker, or hiding some of its resources. Although defensive deception is garnering incr
Autor:
Ahmed H. Anwar, Charles A. Kamhoua
Publikováno v:
2022 IEEE 19th Annual Consumer Communications & Networking Conference (CCNC).
Publikováno v:
IEEE Transactions on Network and Service Management. :1-1