Case Studies of Network Defense with Attack Graph Games

被引:0
|
作者
Durkota, Karel [1 ]
Lisy, Viliam [1 ,3 ]
Kiekintveld, Christopher [4 ]
Bosansky, Branislav [2 ]
Pechoucek, Michal [1 ]
机构
[1] Czech Tech Univ, Ctr Artificial Intelligence, Prague, Czech Republic
[2] Czech Tech Univ, Dept Comp Sci, Prague, Czech Republic
[3] Univ Alberta, Edmonton, AB T6G 2M7, Canada
[4] Univ Texas El Paso, El Paso, TX 79968 USA
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
引用
收藏
页码:24 / 30
页数:7
相关论文
共 50 条
  • [1] Practical attack graph generation for network defense
    Ingols, Kyle
    Lippmann, Richard
    Piwowarski, Keith
    [J]. 22ND ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2006, : 121 - +
  • [2] The attack and defense games
    Sheremeta, Roman M.
    [J]. BEHAVIORAL AND BRAIN SCIENCES, 2019, 42
  • [3] Optimal Network Security Hardening Using Attack Graph Games
    Durkota, Karel
    Lisy, Viliam
    Bosansky, Branislav
    Kiekintveld, Christopher
    [J]. PROCEEDINGS OF THE TWENTY-FOURTH INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE (IJCAI), 2015, : 526 - 532
  • [4] State Grid Network Attack-defense Graph Generation Method
    Zhou, Cheng
    Fei, Jia-xuan
    [J]. COMPUTER SCIENCE AND TECHNOLOGY (CST2016), 2017, : 389 - 398
  • [5] CLB-Defense: based on contrastive learning defense for graph neural network against backdoor attack
    Chen, Jinyin
    Xiong, Haiyang
    Ma, Haonan
    Zheng, Yayu
    [J]. Tongxin Xuebao/Journal on Communications, 2023, 44 (04): : 154 - 166
  • [6] Strategic Attack & Defense in Security Diffusion Games
    Waniek, Marcin
    Michalak, Tomasz P.
    Alshamsi, Aamena
    [J]. ACM TRANSACTIONS ON INTELLIGENT SYSTEMS AND TECHNOLOGY, 2020, 11 (01)
  • [7] Sensor network security defense strategy based on attack graph and improved binary PSO
    Dong, Chaoxian
    Zhao, Lixin
    [J]. SAFETY SCIENCE, 2019, 117 : 81 - 87
  • [8] Adversarial Attack and Defense on Graph Data: A Survey
    Sun, Lichao
    Dou, Yingtong
    Yang, Carl
    Zhang, Kai
    Wang, Ji
    Yu, Philip S.
    He, Lifang
    Li, Bo
    [J]. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2023, 35 (08) : 7693 - 7711
  • [9] Understanding Universal Adversarial Attack and Defense on Graph
    Wang, Tianfeng
    Pan, Zhisong
    Hu, Guyu
    Duan, Yexin
    Pan, Yu
    [J]. INTERNATIONAL JOURNAL ON SEMANTIC WEB AND INFORMATION SYSTEMS, 2022, 18 (01)
  • [10] Application of network cybernetics in network attack and Defense
    He, Ning
    Lu, Yu
    Wang, Lei
    [J]. DYNAMICS OF CONTINUOUS DISCRETE AND IMPULSIVE SYSTEMS-SERIES B-APPLICATIONS & ALGORITHMS, 2006, 13E : 1967 - 1971