2015
DOI: 10.1093/cybsec/tyv007
|View full text |Cite
|
Sign up to set email alerts
|

From physical security to cybersecurity

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
22
0
2

Year Published

2018
2018
2022
2022

Publication Types

Select...
6
1
1

Relationship

1
7

Authors

Journals

citations
Cited by 24 publications
(24 citation statements)
references
References 25 publications
0
22
0
2
Order By: Relevance
“…It is a model for defender-adversary interaction where the defender lays out her strategy (in this paper the classifier) and the adversary responds optimally (choose a least cost evasion). Stackelberg games also allow for scalability compared to the corresponding simultaneous move game [90], [91].…”
Section: A Robustness Of Models To Distribution Driftsmentioning
confidence: 99%
“…It is a model for defender-adversary interaction where the defender lays out her strategy (in this paper the classifier) and the adversary responds optimally (choose a least cost evasion). Stackelberg games also allow for scalability compared to the corresponding simultaneous move game [90], [91].…”
Section: A Robustness Of Models To Distribution Driftsmentioning
confidence: 99%
“…These methods are similar to patrolling methods that try to identify security violation in physical security domains like airports, wildlife sanctuaries, etc. [83].…”
Section: A What To Switch? ≈ What Actions To Play?mentioning
confidence: 99%
“…At the same time, the specific is revealed by the condition that is connected with a special environment of this negative phenomenon functioning that is represented by cyberspace and involved technologies, the use of which should be as safe as possible for the whole county and every member of its society. Security is a critical concern around the world that manifests in problems such as protecting our cyber infrastructure from attacks by criminals and other nation-states; protecting our ports, airports, public transportation, and other critical national infrastructure from terrorists; protecting our wildlife and forests from poachers and smugglers; and curtailing the illegal flow of weapons, drugs, and money across international borders (Sinha et al, 2015).…”
Section: Role and Significance Of Corruption As A Cybersecurity Threatmentioning
confidence: 99%