Location-Aware Measurement for Cyber Mimic Defense: You Cannot Improve What You Cannot Measure
Cyber mimic defense is designed to ensure endogenous security, effectively countering unknown vulnerabilities and backdoors, thereby addressing a significant challenge in cyberspace. However, the immense scale of real-world networks and their intricate topology pose challenges for measuring the effi...
| Published in: | Applied Sciences |
|---|---|
| Main Authors: | Zhe Huang, Yali Yuan, Jiale Fu, Jiajun He, Hongyu Zhu, Guang Cheng |
| Format: | Article |
| Language: | English |
| Published: |
MDPI AG
2023-08-01
|
| Subjects: | |
| Online Access: | https://www.mdpi.com/2076-3417/13/16/9213 |
Similar Items
Genomic variant benchmark: if you cannot measure it, you cannot improve it
by: Sina Majidian, et al.
Published: (2023-10-01)
by: Sina Majidian, et al.
Published: (2023-10-01)
Differential Game‑based Mimic Defense Scheduling Strategy in Power Systems
by: GU Liang, et al.
Published: (2025-05-01)
by: GU Liang, et al.
Published: (2025-05-01)
Meaning and Vision of Mimic Computing and Mimic Security Defense
by: Jiangxing Wu
Published: (2014-07-01)
by: Jiangxing Wu
Published: (2014-07-01)
Meaning and Vision of Mimic Computing and Mimic Security Defense
by: Jiangxing Wu
Published: (2014-07-01)
by: Jiangxing Wu
Published: (2014-07-01)
Microservice Security Framework for IoT by Mimic Defense Mechanism
by: Fei Ying, et al.
Published: (2022-03-01)
by: Fei Ying, et al.
Published: (2022-03-01)
The conceptual model of the country's cyber defense ecosystem
by: alireza keramatipour, et al.
Published: (2024-09-01)
by: alireza keramatipour, et al.
Published: (2024-09-01)
Commentary: You cannot fix what you cannot seeCentral Message
by: Chris C. Cook, MD, et al.
Published: (2020-09-01)
by: Chris C. Cook, MD, et al.
Published: (2020-09-01)
Improved Cyber Defense Modeling Framework for Modeling and Simulating the Lifecycle of Cyber Defense Activities
by: Donghwa Kim, et al.
Published: (2023-01-01)
by: Donghwa Kim, et al.
Published: (2023-01-01)
Method against process control-flow hijacking based on mimic defense
by: Chuanxing PAN, et al.
Published: (2021-01-01)
by: Chuanxing PAN, et al.
Published: (2021-01-01)
Method against process control-flow hijacking based on mimic defense
by: Chuanxing PAN, et al.
Published: (2021-01-01)
by: Chuanxing PAN, et al.
Published: (2021-01-01)
Markov game modeling of mimic defense and defense strategy determination
by: Xingming ZHANG, et al.
Published: (2018-10-01)
by: Xingming ZHANG, et al.
Published: (2018-10-01)
Markov game modeling of mimic defense and defense strategy determination
by: Xingming ZHANG, et al.
Published: (2018-10-01)
by: Xingming ZHANG, et al.
Published: (2018-10-01)
The ecosystem of cyber defense cognitive readiness
by: Morteza Talebi, et al.
Published: (2024-11-01)
by: Morteza Talebi, et al.
Published: (2024-11-01)
Modeling of the mimic defense based on heterogeneous redundancy
by: Junning QIN, et al.
Published: (2020-05-01)
by: Junning QIN, et al.
Published: (2020-05-01)
Modeling of the mimic defense based on heterogeneous redundancy
by: Junning QIN, et al.
Published: (2020-05-01)
by: Junning QIN, et al.
Published: (2020-05-01)
Research progress of mimic multi-execution scheduling algorithm
by: Zhengbin ZHU, et al.
Published: (2021-05-01)
by: Zhengbin ZHU, et al.
Published: (2021-05-01)
Research progress of mimic multi-execution scheduling algorithm
by: Zhengbin ZHU, et al.
Published: (2021-05-01)
by: Zhengbin ZHU, et al.
Published: (2021-05-01)
Implementation architecture of mimic security defense based on SDN
by: Zhen-peng WANG, et al.
Published: (2017-10-01)
by: Zhen-peng WANG, et al.
Published: (2017-10-01)
Mimic defense authentication method for physical access control
by: Qinglei ZHOU, et al.
Published: (2020-06-01)
by: Qinglei ZHOU, et al.
Published: (2020-06-01)
Mimic defense authentication method for physical access control
by: Qinglei ZHOU, et al.
Published: (2020-06-01)
by: Qinglei ZHOU, et al.
Published: (2020-06-01)
Cyber Security of HVDC Systems: A Review of Cyber Threats, Defense, and Testbeds
by: Alfan Presekal, et al.
Published: (2024-01-01)
by: Alfan Presekal, et al.
Published: (2024-01-01)
Blockchain as a Cyber Defense: Opportunities, Applications, and Challenges
by: Suhyeon Lee, et al.
Published: (2022-01-01)
by: Suhyeon Lee, et al.
Published: (2022-01-01)
STUDY OF THE INFLUENCE OF LEGAL SECURITY AND CYBER INTELLIGENCE CAPACITY ON STRENGTHENING GOVERNANCE OF CYBER DEFENSE IN INDONESIA
by: Purnomo W.P., et al.
Published: (2023-12-01)
by: Purnomo W.P., et al.
Published: (2023-12-01)
Obtaining and ranking of components and indicators of cyber power in the defense and of security dimension
by: Khodadad Halili, et al.
Published: (2024-12-01)
by: Khodadad Halili, et al.
Published: (2024-12-01)
Developing cyber defense strategies against future enemy threats on the horizon of 1405
by: Mohammad Sepehri
Published: (2022-02-01)
by: Mohammad Sepehri
Published: (2022-02-01)
Heterogeneous redundancies scheduling algorithm for mimic security defense
by: Qinrang LIU, et al.
Published: (2018-07-01)
by: Qinrang LIU, et al.
Published: (2018-07-01)
Heterogeneous redundancies scheduling algorithm for mimic security defense
by: Qinrang LIU, et al.
Published: (2018-07-01)
by: Qinrang LIU, et al.
Published: (2018-07-01)
A differential feedback scheduling decision algorithm based on mimic defense
by: Ming GAO, et al.
Published: (2020-05-01)
by: Ming GAO, et al.
Published: (2020-05-01)
A differential feedback scheduling decision algorithm based on mimic defense
by: Ming GAO, et al.
Published: (2020-05-01)
by: Ming GAO, et al.
Published: (2020-05-01)
Research on active defense based on multi-stage cyber deception game
by: Yongjin HU, et al.
Published: (2020-08-01)
by: Yongjin HU, et al.
Published: (2020-08-01)
Research on active defense based on multi-stage cyber deception game
by: Yongjin HU, et al.
Published: (2020-08-01)
by: Yongjin HU, et al.
Published: (2020-08-01)
VPN Traffic Hijacking Defense Technology Based on Mimic Defense
by: GAO Zhen, CHEN Fucai, WANG Yawen, HE Weizhen
Published: (2023-11-01)
by: GAO Zhen, CHEN Fucai, WANG Yawen, HE Weizhen
Published: (2023-11-01)
Cognitive readiness components of cyber defense in the military field
by: Morteza Talebi, et al.
Published: (2024-09-01)
by: Morteza Talebi, et al.
Published: (2024-09-01)
Endogenous security architecture of Ethernet switch based on mimic defense
by: Ke SONE, et al.
Published: (2020-05-01)
by: Ke SONE, et al.
Published: (2020-05-01)
Endogenous security architecture of Ethernet switch based on mimic defense
by: Ke SONE, et al.
Published: (2020-05-01)
by: Ke SONE, et al.
Published: (2020-05-01)
Key-area cyberspace mimic defense against data-oriented attacks
by: Chen Ping, et al.
Published: (2025-01-01)
by: Chen Ping, et al.
Published: (2025-01-01)
Robust Defensive Cyber Agent for Multi-Adversary Defense
by: Muhammad O. Farooq
Published: (2025-01-01)
by: Muhammad O. Farooq
Published: (2025-01-01)
Concept and Research Framework for Coordinated Situation Awareness and Active Defense of Cyber-physical Power Systems Against Cyber-attacks
by: Ming Ni, et al.
Published: (2021-01-01)
by: Ming Ni, et al.
Published: (2021-01-01)
Research on mimic decision method based on deep learning
by: Xiaohan YANG, et al.
Published: (2024-02-01)
by: Xiaohan YANG, et al.
Published: (2024-02-01)
Research on mimic decision method based on deep learning
by: Xiaohan YANG, et al.
Published: (2024-02-01)
by: Xiaohan YANG, et al.
Published: (2024-02-01)
Similar Items
-
Genomic variant benchmark: if you cannot measure it, you cannot improve it
by: Sina Majidian, et al.
Published: (2023-10-01) -
Differential Game‑based Mimic Defense Scheduling Strategy in Power Systems
by: GU Liang, et al.
Published: (2025-05-01) -
Meaning and Vision of Mimic Computing and Mimic Security Defense
by: Jiangxing Wu
Published: (2014-07-01) -
Meaning and Vision of Mimic Computing and Mimic Security Defense
by: Jiangxing Wu
Published: (2014-07-01) -
Microservice Security Framework for IoT by Mimic Defense Mechanism
by: Fei Ying, et al.
Published: (2022-03-01)
