Zobrazeno 1 - 4
of 4
pro vyhledávání: '"Sharmin, Nazia"'
Autor:
Roy, Shanto, Sharmin, Nazia, Miah, Mohammad Sujan, Acosta, Jaime C, Kiekintveld, Christopher, Laszka, Aron
Adversarial reconnaissance is a crucial step in sophisticated cyber-attacks as it enables threat actors to find the weakest points of otherwise well-defended systems. To thwart reconnaissance, defenders can employ cyber deception techniques, such as
Externí odkaz:
http://arxiv.org/abs/2306.06769
Adversaries are often able to penetrate networks and compromise systems by exploiting vulnerabilities in people and systems. The key to the success of these attacks is information that adversaries collect throughout the phases of the cyber kill chain
Externí odkaz:
http://arxiv.org/abs/2105.04749
Autor:
Anjum, Iffat, Miah, Mohammad Sujan, Zhu, Mu, Sharmin, Nazia, Kiekintveld, Christopher, Enck, William, Singh, Munindar P
Publikováno v:
AAAI Workshop on Artificial Intelligence for Cyber Security (AICS), 2020
Enterprises are increasingly concerned about adversaries that slowly and deliberately exploit resources over the course of months or even years. A key step in this kill chain is network reconnaissance, which has historically been active (e.g., networ
Externí odkaz:
http://arxiv.org/abs/2002.09069
Autor:
ROY, SHANTO1 sroy10@uh.edu, SHARMIN, NAZIA2 nsharmin@miners.utep.edu, ACOSTA, JAIME C.3 jaime.c.acosta.civ@army.mil, KIEKINTVELD, CHRISTOPHER2 cdkiekintveld@utep.edu, LASZKA, ARON1 alaszka@uh.edu
Publikováno v:
ACM Computing Surveys. Jul2023, Vol. 55 Issue 6, p1-38. 38p.