Widely used deep learning models are found to have poor robustness. Litt...
It is challenging for a security analyst to detect or defend against
cyb...
Along with the massive growth of the Internet from the 1990s until now,
...
Cyberspace is full of uncertainty in terms of advanced and sophisticated...
Model-based evaluation in cybersecurity has a long history. Attack Graph...
Moving Target Defense (MTD) is a proactive security mechanism which chan...
Modulation classification, recognized as the intermediate step between s...
Modulation classification, an intermediate process between signal detect...
Security metrics present the security level of a system or a network in ...
With the increasing growth of cyber-attack incidences, it is important t...
Resource constrained Internet-of-Things (IoT) devices are highly likely ...
Reactive defense mechanisms, such as intrusion detection systems, have m...
As a solution to protect and defend a system against inside attacks, man...
Internet of Things (IoT) devices can be exploited by the attackers as en...
Cloud service providers offer their customers with on-demand and
cost-ef...
Cloud computing has been adopted widely, providing on-demand computing
r...
Network address shuffling is one of moving target defense (MTD) techniqu...