Use of cyber attack and defense agents in cyber ranges: A case study.
Muhammad Mudassar YaminBasel KattPublished in: Comput. Secur. (2022)
Keyphrases
- cyber defense
- cyber attacks
- cyber security
- intrusion detection
- multi agent systems
- information security
- cyber crime
- multi agent
- intelligent agents
- network security
- critical infrastructure
- countermeasures
- intrusion detection system
- decision making
- mobile agents
- security policies
- smart grid
- trust model
- agent technology
- computer networks
- information systems
- network traffic
- attack detection