MILCOM 2015 - 2015 IEEE Military Communications Conference 2015
DOI: 10.1109/milcom.2015.7357465
|View full text |Cite
|
Sign up to set email alerts
|

Ecology-inspired cyber risk model for propagation of vulnerability exploitation in tactical edge

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 19 publications
0
2
0
Order By: Relevance
“…Specify a vector for the time t A at which attack is initiated. (ii) Cycle over the rate of external compromise c and the rate of co-compromise c s (iii) Cycle over time from t � 0 to t � T. (iv) For each time, compute x(t) from equation (8) and y(t) � N − x(t). (v) Cycle over each time of attack.…”
Section: A3 Run the Model Of Compromise In The Absence Of Defensivementioning
confidence: 99%
See 1 more Smart Citation
“…Specify a vector for the time t A at which attack is initiated. (ii) Cycle over the rate of external compromise c and the rate of co-compromise c s (iii) Cycle over time from t � 0 to t � T. (iv) For each time, compute x(t) from equation (8) and y(t) � N − x(t). (v) Cycle over each time of attack.…”
Section: A3 Run the Model Of Compromise In The Absence Of Defensivementioning
confidence: 99%
“…To do this, we build on existing nonlinear dynamic models of compromise of cyber systems that import ideas from the population biology of disease [6][7][8][9][10][11], characterize performance using either a nonlinear metric for a generic physical system (cf. [6][7][8][9][10]) or the nonlinear dynamics of an electric grid, and introduce counter measures having nonlinear dynamics based on the immune systems [12,13].…”
Section: Introductionmentioning
confidence: 99%