منابع مشابه
Network Attack and Defense
Whoever thinks his problem can be solved using cryptography, doesn't understand his problem and doesn't understand cryptography. If you spend more on coffee than on IT security, then you will be hacked. What's more, you deserve to be hacked. So far we've seen a large number of attacks against individual computers and other devices. But attacks increasingly depend on connectivity. Consider the f...
متن کاملDeception by Design: Evidence-Based Signaling Games for Network Defense
Deception plays a critical role in the financial industry, online markets, national defense, and countless other areas. Understanding and harnessing deception especially in cyberspace is both crucial and difficult. Recent work in this area has used game theory to study the roles of incentives and rational behavior. Building upon this work, we employ a game-theoretic model for the purpose of mec...
متن کاملSample design using imperfect design data
A well-designed sampling plan can greatly enhance the information that can be produced from a survey. Once a broad sample design is identified, specific design parameters such as sample sizes and selection probabilities need to be chosen. This is typically achieved using an optimal sample design, which minimizes the variance of a key statistic or statistics, expressed as a function of design pa...
متن کاملDistributed Network Defense
We propose a new paradigm for network defense: a hierarchical network of lightweight, mobile and adaptive tools combined with a distributed, collaborative intrusion detection environment. Agents are integrated with the collaborative IDS in order to provide them with a wider array of information to use in their response activities. This provides for both a mobile and adaptive defense, while stil...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: SSRN Electronic Journal
سال: 2015
ISSN: 1556-5068
DOI: 10.2139/ssrn.2574178