Cargando…
The Work‐Averse Cyberattacker Model: Theory and Evidence from Two Million Attack Signatures
The assumption that a cyberattacker will potentially exploit all present vulnerabilities drives most modern cyber risk management practices and the corresponding security investments. We propose a new attacker model, based on dynamic optimization, where we demonstrate that large, initial, fixed cost...
Autores principales: | Allodi, Luca, Massacci, Fabio, Williams, Julian |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
John Wiley and Sons Inc.
2021
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9543271/ https://www.ncbi.nlm.nih.gov/pubmed/33960506 http://dx.doi.org/10.1111/risa.13732 |
Ejemplares similares
-
RAPT: A Robust Attack Path Tracing Algorithm to Mitigate SYN-Flood DDoS Cyberattacks
por: AlArnaout, Zakwan, et al.
Publicado: (2022) -
Using attack graphs to defend healthcare systems from cyberattacks: a longitudinal empirical study
por: Ünözkan, Hüseyin, et al.
Publicado: (2022) -
Spatiotemporal Patterns and Predictability of Cyberattacks
por: Chen, Yu-Zhong, et al.
Publicado: (2015) -
Are you ready for a cyberattack?
por: Pinkham, Daniel W., et al.
Publicado: (2021) -
Assessing resilience of hospitals to cyberattack
por: Ghayoomi, Hadi, et al.
Publicado: (2021)