Moving Target Defense II Application of Game Theory and Adversarial
Our cyber defenses are static and are governed by lengthy processes, e.g., for testing and security patch deployment. Adversaries could plan their attacks carefully over time and launch attacks at cyber speeds at any given moment. We need a ne
- PDF / 7,505,185 Bytes
- 209 Pages / 439.36 x 666.15 pts Page_size
- 5 Downloads / 212 Views
Data Loading...