Optimal Strategies for Detecting Data Exfiltration by Internal and External Attackers.
Karel DurkotaViliam LisýChristopher KiekintveldKarel HorákBranislav BosanskýTomás PevnýPublished in: GameSec (2017)
Keyphrases
- internal and external
- optimal strategy
- image data
- data structure
- data sets
- raw data
- database
- original data
- training data
- data analysis
- data collection
- data processing
- synthetic data
- monte carlo
- data distribution
- complex data
- input data
- small number
- markov chain
- high quality
- computer systems
- high dimensional data
- utility function
- decision problems
- data points
- probability distribution
- databases
- multi agent