ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Thoughts on higher-level adversary modeling
Mapping Intimacies
◽
10.1117/12.500934
◽
2003
◽
Author(s):
Paul K. Davis
Keyword(s):
Adversary Modeling
Download Full-text
Related Documents
Cited By
References
Pitfalls in Machine Learning-based Adversary Modeling for Hardware Systems
2020 Design, Automation & Test in Europe Conference & Exhibition (DATE)
◽
10.23919/date48585.2020.9116316
◽
2020
◽
Author(s):
Fatemeh Ganji
◽
Sarah Amir
◽
Shahin Tajik
◽
Domenic Forte
◽
Jean-Pierre Seifert
Keyword(s):
Machine Learning
◽
Adversary Modeling
Download Full-text
Integrating Cyber-D&D into Adversary Modeling for Active Cyber Defense
Cyber Deception
◽
10.1007/978-3-319-32699-3_1
◽
2016
◽
pp. 1-22
◽
Cited By ~ 8
Author(s):
Frank J. Stech
◽
Kristin E. Heckman
◽
Blake E. Strom
Keyword(s):
Cyber Defense
◽
Adversary Modeling
Download Full-text
Erratum to: Integrating Cyber-D&D into Adversary Modeling for Active Cyber Defense
Cyber Deception
◽
10.1007/978-3-319-32699-3_13
◽
2016
◽
pp. E1-E1
Author(s):
Frank J. Stech
◽
Kristin E. Heckman
◽
Blake E. Strom
Keyword(s):
Cyber Defense
◽
Adversary Modeling
Download Full-text
Collaborative effects-based planning and adversary modeling: lessons learned from JEFX '04
10.1117/12.604457
◽
2005
◽
Author(s):
Nicholas J. Pioch
◽
Stewart F. Greathouse
Keyword(s):
Lessons Learned
◽
Adversary Modeling
Download Full-text
Adversary modeling: an analysis of criminal activities analogous to potential threats to nuclear safeguard systems
10.2172/6393872
◽
1978
◽
Author(s):
J.M. Heineke
Keyword(s):
Adversary Modeling
Download Full-text
Adversary Modeling and Simulation in Cyber Warfare
Proceedings of The Ifip Tc 11 23rd International Information Security Conference - IFIP – The International Federation for Information Processing
◽
10.1007/978-0-387-09699-5_30
◽
2008
◽
pp. 461-475
◽
Cited By ~ 2
Author(s):
Samuel N. Hamilton
◽
Wendy L. Hamilton
Keyword(s):
Modeling And Simulation
◽
Cyber Warfare
◽
Adversary Modeling
Download Full-text
Comparison of Approaches for Adversary Modeling Decision Support for Counterterrorism
Conflict and Complexity - Understanding Complex Systems
◽
10.1007/978-1-4939-1705-1_9
◽
2015
◽
pp. 179-197
Author(s):
Barry Ezell
◽
Gregory S. Parnell
Keyword(s):
Decision Support
◽
Adversary Modeling
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close