309 related articles for article (PubMed ID: 23829034)
1. Cyber situation awareness: modeling detection of cyber attacks with instance-based learning theory.
Dutt V; Ahn YS; Gonzalez C
Hum Factors; 2013 Jun; 55(3):605-18. PubMed ID: 23829034
[TBL] [Abstract][Full Text] [Related]
2. Defending the Defender: Adversarial Learning Based Defending Strategy for Learning Based Security Methods in Cyber-Physical Systems (CPS).
Sheikh ZA; Singh Y; Singh PK; Gonçalves PJS
Sensors (Basel); 2023 Jun; 23(12):. PubMed ID: 37420626
[TBL] [Abstract][Full Text] [Related]
3. Multistage Attack-Defense Graph Game Analysis for Protection Resources Allocation Optimization Against Cyber Attacks Considering Rationality Evolution.
Shao C; Li YF
Risk Anal; 2022 May; 42(5):1086-1105. PubMed ID: 34636067
[TBL] [Abstract][Full Text] [Related]
4. Adversarial Risk Analysis to Allocate Optimal Defense Resources for Protecting Cyber-Physical Systems from Cyber Attacks.
Wang W; Di Maio F; Zio E
Risk Anal; 2019 Dec; 39(12):2766-2785. PubMed ID: 31361041
[TBL] [Abstract][Full Text] [Related]
5. Maintaining defender's reputation in anomaly detection against insider attacks.
Zhang N; Yu W; Fu X; Das SK
IEEE Trans Syst Man Cybern B Cybern; 2010 Jun; 40(3):597-611. PubMed ID: 19933017
[TBL] [Abstract][Full Text] [Related]
6. Influence of Human Factors on Cyber Security within Healthcare Organisations: A Systematic Review.
Nifakos S; Chandramouli K; Nikolaou CK; Papachristou P; Koch S; Panaousis E; Bonacina S
Sensors (Basel); 2021 Jul; 21(15):. PubMed ID: 34372354
[No Abstract] [Full Text] [Related]
7. Defender-Attacker Games with Asymmetric Player Utilities.
Zhai Q; Peng R; Zhuang J
Risk Anal; 2020 Feb; 40(2):408-420. PubMed ID: 31529803
[TBL] [Abstract][Full Text] [Related]
8. Adversarial risk analysis for counterterrorism modeling.
Rios J; Rios Insua D
Risk Anal; 2012 May; 32(5):894-915. PubMed ID: 22150163
[TBL] [Abstract][Full Text] [Related]
9. Learning About the Effects of Alert Uncertainty in Attack and Defend Decisions via Cognitive Modeling.
Aggarwal P; Moisan F; Gonzalez C; Dutt V
Hum Factors; 2022 Mar; 64(2):343-358. PubMed ID: 32954818
[TBL] [Abstract][Full Text] [Related]
10. Cyber-attack method and perpetrator prediction using machine learning algorithms.
Bilen A; Özer AB
PeerJ Comput Sci; 2021; 7():e475. PubMed ID: 33954249
[TBL] [Abstract][Full Text] [Related]
11. LAFIT: Efficient and Reliable Evaluation of Adversarial Defenses With Latent Features.
Yu Y; Gao X; Xu CZ
IEEE Trans Pattern Anal Mach Intell; 2024 Jan; 46(1):354-369. PubMed ID: 37831567
[TBL] [Abstract][Full Text] [Related]
12. Adversarial risk analysis with incomplete information: a level-k approach.
Rothschild C; McLay L; Guikema S
Risk Anal; 2012 Jul; 32(7):1219-31. PubMed ID: 22035126
[TBL] [Abstract][Full Text] [Related]
13. A holistic and proactive approach to forecasting cyber threats.
Almahmoud Z; Yoo PD; Alhussein O; Farhat I; Damiani E
Sci Rep; 2023 May; 13(1):8049. PubMed ID: 37198304
[TBL] [Abstract][Full Text] [Related]
14. Breaking down silos between business continuity and cyber security.
Phillips R; Tanner B
J Bus Contin Emer Plan; 2019 Jan; 12(3):224-232. PubMed ID: 30857581
[TBL] [Abstract][Full Text] [Related]
15. How is cyber threat evolving and what do organisations need to consider?
Borrett M; Carter R; Wespi A
J Bus Contin Emer Plan; 2013-2014 Winter; 7(2):163-71. PubMed ID: 24457327
[TBL] [Abstract][Full Text] [Related]
16. Defense of Cyber Infrastructures Against Cyber-Physical Attacks Using Game-Theoretic Models.
Rao NS; Poole SW; Ma CY; He F; Zhuang J; Yau DK
Risk Anal; 2016 Apr; 36(4):694-710. PubMed ID: 25847370
[TBL] [Abstract][Full Text] [Related]
17. Deterrence and Risk Preferences in Sequential Attacker-Defender Games with Continuous Efforts.
Payyappalli VM; Zhuang J; Jose VRR
Risk Anal; 2017 Nov; 37(11):2229-2245. PubMed ID: 28314059
[TBL] [Abstract][Full Text] [Related]
18. Cyber Security: Effects of Penalizing Defenders in Cyber-Security Games via Experimentation and Computational Modeling.
Maqbool Z; Aggarwal P; Pammi VSC; Dutt V
Front Psychol; 2020; 11():11. PubMed ID: 32063872
[TBL] [Abstract][Full Text] [Related]
19. Towards a Machine Learning Based Situational Awareness Framework for Cybersecurity: An SDN Implementation.
Nikoloudakis Y; Kefaloukos I; Klados S; Panagiotakis S; Pallis E; Skianis C; Markakis EK
Sensors (Basel); 2021 Jul; 21(14):. PubMed ID: 34300676
[TBL] [Abstract][Full Text] [Related]
20. Business continuity strategies for cyber defence: battling time and information overload.
Streufert J
J Bus Contin Emer Plan; 2010 Nov; 4(4):303-16. PubMed ID: 21177217
[TBL] [Abstract][Full Text] [Related]
[Next] [New Search]