ADT2AMAS: Managing Agents in Attack-Defence Scenarios
Abstract
References
Index Terms
- ADT2AMAS: Managing Agents in Attack-Defence Scenarios
Recommendations
Pareto Efficient Solutions of Attack-Defence Trees
Proceedings of the 4th International Conference on Principles of Security and Trust - Volume 9036Attack-defence trees are a promising approach for representing threat scenarios and possible countermeasures in a concise and intuitive manner. An attack-defence tree describes the interaction between an attacker and a defender, and is evaluated by ...
Use of cyber attack and defense agents in cyber ranges: A case study
AbstractWith the ever-changing cybersecurity landscape, the need for a continuous training for new cybersecurity skill sets is a requirement. Such continuous training programs can be delivered on platforms like cyber ranges. Cyber ranges ...
A lab implementation of SYN flood attack and defense
SIGITE '08: Proceedings of the 9th ACM SIGITE conference on Information technology educationA "denial-of-service" attack is characterized by an explicit attempt by attackers to prevent legitimate users of a service from using that service. SYN flood attack is one of the most common types of DoS. In this lab, we model and simulate a real world ...
Comments
Information & Contributors
Information
Published In

- General Chairs:
- Frank Dignum,
- Alessio Lomuscio,
- Program Chairs:
- Ulle Endriss,
- Ann Nowé
Sponsors
Publisher
International Foundation for Autonomous Agents and Multiagent Systems
Richland, SC
Publication History
Check for updates
Author Tags
Qualifiers
- Demonstration
Funding Sources
- French National Centre for Scientific Research Polish Academy of Sciences
- National Centre for Research and Development Poland Luxembourg National Research Fund
Conference
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 32Total Downloads
- Downloads (Last 12 months)2
- Downloads (Last 6 weeks)0
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in