Deakin University
Browse

File(s) under permanent embargo

Modeling malicious activities in cyber space

Version 2 2024-06-05, 05:25
Version 1 2016-03-10, 10:29
journal contribution
posted on 2024-06-05, 05:25 authored by S Yu, G Wang, W Zhou
Cyber attacks are an unfortunate part of society as an increasing amount of critical infrastructure is managed and controlled via the Internet. In order to protect legitimate users, it is critical for us to obtain an accurate and timely understanding of our cyber opponents. However, at the moment we lack effective tools to do this. In this article we summarize the work on modeling malicious activities from various perspectives, discuss the pros and cons of current models, and present promising directions for possible efforts in the near future.

History

Journal

IEEE network

Volume

29

Season

November-December

Pagination

83-87

Location

Piscataway, N.J.

ISSN

0890-8044

Language

eng

Publication classification

C Journal article, C1 Refereed article in a scholarly journal

Copyright notice

2015, IEEE

Issue

6

Publisher

IEEE