Honeypots play a crucial role in implementing various cyber deception
te...
Reconnaissance activities precedent other attack steps in the cyber kill...
Over the years, honeypots emerged as an important security tool to under...
The proliferation of the Internet of Things (IoT) has raised concerns ab...
This paper investigates the problem of synthesizing proactive defense sy...
Many recent breakthroughs in multi-agent reinforcement learning (MARL)
r...
Deception is a crucial tool in the cyberdefence repertoire, enabling
def...
Deep neural network (DNN) is a popular model implemented in many systems...
Generative adversarial networks (GANs) are often billed as "universal
di...
Defensive deception is a promising approach for cyberdefense. Although
d...
Defensive deception techniques have emerged as a promising proactive def...
While social networks are widely used as a media for information diffusi...
Today's high-stakes adversarial interactions feature attackers who const...
In this paper, we systematically explore the attack surface of the Block...
Value methods for solving stochastic games with partial observability mo...
Selfish mining is a well known vulnerability in blockchains exploited by...
Internet of Things (IoT) is becoming an increasingly attractive target f...
The problem of cooperative spectrum leasing to unlicensed Internet of Th...