Showing 1 - 20 results of 27 for search 'defenseman~', query time: 2.83s Refine Results
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7

    Survey on cyber deception by Zhao-peng JIA, Bin-xing FANG, Chao-ge LIU, Qi-xu LIU, Jian-bao LIN

    Published 2017-12-01
    “…The asymmetric situation of network attacks and defenses is one of the key issues of current network security.Cyber deception was a revolutionary technology introduced by defenders to alter the asymmetric situation.By thwarting an attacker's cognitive processes,defenders can mislead attackers,hence causing them to take specific actions that aid network security defenses.In this way,defenders can log attackers'behavior and method,increase cost for the attackers to launch a successful attack,as well as reduce the probability of an attacker's success.Cyber deception formally and classify cyber deception into four classes was defined.Then,the cyber deceptions’development was divided into three stages,and each stage’s character was decided.Next,a hierarchical model to describe the existing work was proposed.At last,the countermeasures in cyber deception and the development trends in this field was discussed.…”
    Get full text
    Article
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15

    A Comparative Study of Mulla Sadra and Plantinga’s Views on the Issue of Evil by Masoumeh Ameri, Farida Rezaei

    Published 2024-05-01
    “…He believes that a real justification for evils cannot be found, thus he tries to prove the possibility or probability of rational justification by God for the existence of evils.Plantinga’s solutions to the issue of evil include explaining possible worlds and free will defense.In some of the new terms that form the basis of Plantinga’s arguments, there are fallacies or errors, which include pervasive evil and the critique of the realization of possible worlds and not their actuality.Similarities between Mulla Sadra’s and Plantinga’s views include belief in the existence of God, the absolute and unlimited knowledge of God, and belief in God’s absolute power and benevolence.Differences between Mulla Sadra’s and Plantinga’s views include the difference in the type of approach and the predominance of a logical view of the issue of evil by Plantinga as opposed to Mulla Sadra, the inherent nature of sin and pervasive evil, and Mulla Sadra’s defense of the theory of divine justice and Plantinga’s lack of defense in this regard. …”
    Get full text
    Article
  16. 16

    Analysis of cyberspace security based on game theory by Jian-ming ZHU, Qin WANG

    Published 2015-12-01
    “…Information security economics is an important research area and game theory is one of the main basic theories and tools of cyberspace security.Based on game theory,the main problems of cyberspace securing were analyzed which including network attack and defense,cryptographic protocol design,and security technology con-figuration.The conflicts between attackers and defenders as well as the dependence among defenders were mainly analyzed on network and defense.Game theory’s applications in secret sharing and secure multi-party computation were emphasized on cryptographic protocol design.The game theory’s applications in intrusion detection system and firewall technology were analyzed on security technology configuration.Finally,the limitations of current re-searches and carries on the forecast to the future research directions were pointed out.…”
    Get full text
    Article
  17. 17

    Optimal strategy selection approach of moving target defense based on Markov time game by Jinglei TAN, Hengwei ZHANG, Hongqi ZHANG, Hui JIN, Cheng LEI

    Published 2020-01-01
    “…For the problem that the existed game model was challenging to model the dynamic continuous characteristics of network attack and defense confrontation effectively,a method based on Markov time game was proposed to select the optimal strategy for moving target defense.Based on the analysis of the attack and defense confrontation process of moving targets,the set of moving target attack and defense strategies was constructed.The dynamics of the single-stage moving target defense process was described by time game.The randomness of multi-stage moving target defense state transformation was described by Markov decision process.At the same time,by abstracting the use of resource vulnerability by attack-defense participants as the alternation of the control of the attack surface,the versatility of the game model was effectively guaranteed.On this basis,the existence of equilibrium was analyzed and proved,and the optimal strategy selection algorithm was designed.Finally,the practicality of the constructed model and the effectiveness of the algorithm are verified by an application example.…”
    Get full text
    Article
  18. 18
  19. 19
  20. 20