Game Theory and Machine Learning for Cyber Security 2021
DOI: 10.1002/9781119723950.ch12
|View full text |Cite
|
Sign up to set email alerts
|

Cyber Autonomy in Software Security: Techniques and Tactics

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 16 publications
0
1
0
Order By: Relevance
“…Cybersecurity research normally focuses on the interactions between the attacker and defender, where the attacker is trying to exploit the computer system and the defender is trying to protect the computer system against the attacker, for example 1 and 2 . This simplified view of cybersecurity neglects the computer users, whose requirements and activities are why the computer system exists.…”
Section: Introductionmentioning
confidence: 99%
“…Cybersecurity research normally focuses on the interactions between the attacker and defender, where the attacker is trying to exploit the computer system and the defender is trying to protect the computer system against the attacker, for example 1 and 2 . This simplified view of cybersecurity neglects the computer users, whose requirements and activities are why the computer system exists.…”
Section: Introductionmentioning
confidence: 99%