Matches in SemOpenAlex for { <https://semopenalex.org/work/W2233360186> ?p ?o ?g. }
Showing items 1 to 85 of
85
with 100 items per page.
- W2233360186 endingPage "73" @default.
- W2233360186 startingPage "57" @default.
- W2233360186 abstract "Increasing concern about insider threats, cyber-espionage, and other types of attacks which involve a high degree of stealthiness has renewed the desire to better understand the timing of actions to audit, clean, or otherwise mitigate such attacks. However, to the best of our knowledge, the modern literature on games shares a common limitation: the assumption that the cost and effectiveness of the players’ actions are time-independent. In practice, however, the cost and success probability of attacks typically vary with time, and adversaries may only attack when an opportunity is present (e.g., when a vulnerability has been discovered). In this paper, we propose and study a model which captures dynamic environments. More specifically, we study the problem faced by a defender who has deployed a new service or resource, which must be protected against cyber-attacks. We assume that adversaries discover vulnerabilities according to a given vulnerability-discovery process which is modeled as an arbitrary function of time. Attackers and defenders know that each found vulnerability has a basic lifetime, i.e., the likelihood that a vulnerability is still exploitable at a later date is subject to the efforts by ethical hackers who may rediscover the vulnerability and render it useless for attackers. At the same time, the defender may invest in mitigation efforts to lower the impact of an exploited vulnerability. Attackers therefore face the dilemma to either exploit a vulnerability immediately, or wait for the defender to let its guard down. The latter choice leaves the risk to come away empty-handed. We develop two versions of our model, i.e., a continuous-time and a discrete-time model, and conduct an analytic and numeric analysis to take first steps towards actionable guidelines for sound security investments in dynamic contested environments." @default.
- W2233360186 created "2016-06-24" @default.
- W2233360186 creator A5049435924 @default.
- W2233360186 creator A5063714878 @default.
- W2233360186 creator A5089194215 @default.
- W2233360186 date "2015-01-01" @default.
- W2233360186 modified "2023-10-05" @default.
- W2233360186 title "Games of Timing for Security in Dynamic Environments" @default.
- W2233360186 cites W145322853 @default.
- W2233360186 cites W1482734477 @default.
- W2233360186 cites W1533945010 @default.
- W2233360186 cites W156783801 @default.
- W2233360186 cites W1596446146 @default.
- W2233360186 cites W17195039 @default.
- W2233360186 cites W1738749088 @default.
- W2233360186 cites W1985906366 @default.
- W2233360186 cites W2015787697 @default.
- W2233360186 cites W2017809722 @default.
- W2233360186 cites W2021348304 @default.
- W2233360186 cites W2052611279 @default.
- W2233360186 cites W2053617855 @default.
- W2233360186 cites W2056075452 @default.
- W2233360186 cites W2067064328 @default.
- W2233360186 cites W2110522107 @default.
- W2233360186 cites W2114712239 @default.
- W2233360186 cites W2130887290 @default.
- W2233360186 cites W2142227154 @default.
- W2233360186 cites W2155597028 @default.
- W2233360186 cites W2165913973 @default.
- W2233360186 cites W2230744892 @default.
- W2233360186 cites W4236841844 @default.
- W2233360186 cites W51794740 @default.
- W2233360186 cites W77047371 @default.
- W2233360186 cites W85747787 @default.
- W2233360186 cites W86490778 @default.
- W2233360186 cites W988103176 @default.
- W2233360186 doi "https://doi.org/10.1007/978-3-319-25594-1_4" @default.
- W2233360186 hasPublicationYear "2015" @default.
- W2233360186 type Work @default.
- W2233360186 sameAs 2233360186 @default.
- W2233360186 citedByCount "9" @default.
- W2233360186 countsByYear W22333601862015 @default.
- W2233360186 countsByYear W22333601862016 @default.
- W2233360186 countsByYear W22333601862018 @default.
- W2233360186 countsByYear W22333601862019 @default.
- W2233360186 countsByYear W22333601862021 @default.
- W2233360186 crossrefType "book-chapter" @default.
- W2233360186 hasAuthorship W2233360186A5049435924 @default.
- W2233360186 hasAuthorship W2233360186A5063714878 @default.
- W2233360186 hasAuthorship W2233360186A5089194215 @default.
- W2233360186 hasBestOaLocation W22333601862 @default.
- W2233360186 hasConcept C141141315 @default.
- W2233360186 hasConcept C165696696 @default.
- W2233360186 hasConcept C199360897 @default.
- W2233360186 hasConcept C38652104 @default.
- W2233360186 hasConcept C41008148 @default.
- W2233360186 hasConcept C86844869 @default.
- W2233360186 hasConcept C95713431 @default.
- W2233360186 hasConceptScore W2233360186C141141315 @default.
- W2233360186 hasConceptScore W2233360186C165696696 @default.
- W2233360186 hasConceptScore W2233360186C199360897 @default.
- W2233360186 hasConceptScore W2233360186C38652104 @default.
- W2233360186 hasConceptScore W2233360186C41008148 @default.
- W2233360186 hasConceptScore W2233360186C86844869 @default.
- W2233360186 hasConceptScore W2233360186C95713431 @default.
- W2233360186 hasLocation W22333601861 @default.
- W2233360186 hasLocation W22333601862 @default.
- W2233360186 hasOpenAccess W2233360186 @default.
- W2233360186 hasPrimaryLocation W22333601861 @default.
- W2233360186 hasRelatedWork W1968625315 @default.
- W2233360186 hasRelatedWork W1987059498 @default.
- W2233360186 hasRelatedWork W2184504821 @default.
- W2233360186 hasRelatedWork W2370676653 @default.
- W2233360186 hasRelatedWork W2943873441 @default.
- W2233360186 hasRelatedWork W3006507989 @default.
- W2233360186 hasRelatedWork W3163508776 @default.
- W2233360186 hasRelatedWork W3176479423 @default.
- W2233360186 hasRelatedWork W4250073058 @default.
- W2233360186 hasRelatedWork W4386004672 @default.
- W2233360186 isParatext "false" @default.
- W2233360186 isRetracted "false" @default.
- W2233360186 magId "2233360186" @default.
- W2233360186 workType "book-chapter" @default.