Interdiction models for delaying adversarial attacks against critical information technology infrastructure

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Risks, Limitations and the Need for Additional Measures Against Ransomware in the Health Information Technology Infrastructure

Introduction: Even before the Covid 19 pandemic, one of the lucrative targets for attackers behind ransomware attacks was Encroaching on the continuity of services in the field of health information technology. In this study, for the first time, while introducing, relying on statistics and modeling, it is shown that the prevention and counteraction of these attacks in the IT infrastructure of t...

متن کامل

Defense-gan: Protecting Classifiers against Adversarial Attacks Using Generative Models

In recent years, deep neural network approaches have been widely adopted for machine learning tasks, including classification. However, they were shown to be vulnerable to adversarial perturbations: carefully crafted small perturbations can cause misclassification of legitimate images. We propose Defense-GAN, a new framework leveraging the expressive capability of generative models to defend de...

متن کامل

Models of critical information infrastructure protection

This paper advocates the need to conceptualize or model critical information infrastructure protection (CIIP) in order to explain regulatory choices made by governments regarding CIIP. Building on previous attempts, it proposes two models of CIIP: the national security model and the business continuity model. Each of these models is based on a different, sometimes contrasting, set of values, na...

متن کامل

Information Technology (IT) and Critical Infrastructure Interdependencies for Emergency Response

Information technologies and other critical infrastructures are interconnected in ways that can lead to vulnerabilities in the ability of these infrastructures to perform during natural disasters and acts of terrorism either to reduce adverse consequences or provide needed emergency response services. This research applies and adapts a number of indicators of infrastructure interdependency base...

متن کامل

Divide, Denoise, and Defend against Adversarial Attacks

Deep neural networks, although shown to be a successful class of machine learning algorithms, are known to be extremely unstable to adversarial perturbations. Improving the robustness of neural networks against these attacks is important, especially for security-critical applications. To defend against such attacks, we propose dividing the input image into multiple patches, denoising each patch...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Naval Research Logistics (NRL)

سال: 2019

ISSN: 0894-069X,1520-6750

DOI: 10.1002/nav.21859