Allocating patrolling resources to effectively thwart intelligent attackers
This thesis considers the allocation of patrolling resources deployed in an effort to thwart intelligent attackers, who are committing malicious acts at unknown locations which take a specified length of time to complete. This thesis considers patrolling games which depend on three parameters; a gra...
| Main Author: | Lowbridge, Thomas |
|---|---|
| Format: | Thesis (University of Nottingham only) |
| Language: | English |
| Published: |
2021
|
| Subjects: | |
| Online Access: | https://eprints.nottingham.ac.uk/65009/ |
Similar Items
Multi-cyber framework for availability enhancement of cyber physical systems
by: Parvin, Sazia, et al.
Published: (2012)
by: Parvin, Sazia, et al.
Published: (2012)
Cyber Risk Disclosure Practice in Top 10 U.S. Information Technology Companies: An Empirical Analysis
by: Al Lawati, Taha Mustafa Mohsin
Published: (2017)
by: Al Lawati, Taha Mustafa Mohsin
Published: (2017)
A survey on cyber security of CAV
by: He, Qiyi, et al.
Published: (2017)
by: He, Qiyi, et al.
Published: (2017)
Modelling cyber-security experts' decision making processes using aggregation operators
by: Miller, Simon, et al.
Published: (2016)
by: Miller, Simon, et al.
Published: (2016)
A human centric approach to unintentional insider threat: development of a sociotechnical framework
by: Khan, Neeshe
Published: (2023)
by: Khan, Neeshe
Published: (2023)
Survey on economics of information security
by: Aminnezhad, Asou, et al.
Published: (2016)
by: Aminnezhad, Asou, et al.
Published: (2016)
Detecting coordinated distributed attacks using mobile agents with associated managers architecture
by: Javan, Ali
Published: (2011)
by: Javan, Ali
Published: (2011)
An attack on undeniable partially blind signatures
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
The influence of usable security on security culture
by: Fallatah, Wesam
Published: (2025)
by: Fallatah, Wesam
Published: (2025)
A multi-factor authentication scheme using attack recognition and key generator technique
by: Mohd Ariffin, Noor Afiza
Published: (2017)
by: Mohd Ariffin, Noor Afiza
Published: (2017)
Modeling of post-incident root cause analysis for cross site request forgery (CSRF) attack
by: Mustafa, Mohd Nawawi
Published: (2015)
by: Mustafa, Mohd Nawawi
Published: (2015)
Design of a lightweight virtual honeynet based on linux container virtualization
by: Memari, Nogol
Published: (2014)
by: Memari, Nogol
Published: (2014)
A study on the factors effecting yield spread of 10 years Malaysian Government Securities / Mohd Amin Abdullah
by: Abdullah, Mohd Amin
Published: (2011)
by: Abdullah, Mohd Amin
Published: (2011)
A new security framework to prevent denial of service and replay attacks for IEEE 802.11 wireless networks
by: Malekzadeh, Mina
Published: (2011)
by: Malekzadeh, Mina
Published: (2011)
Energy trust system for detecting sybil attacks in clustered wireless sensor network
by: Hussein, Noor Sabeeh
Published: (2016)
by: Hussein, Noor Sabeeh
Published: (2016)
An experimental evaluation of DoS attack and its impact on throughput of IEEE 802.11 wireless networks
by: Malekzadeh, Mina, et al.
Published: (2008)
by: Malekzadeh, Mina, et al.
Published: (2008)
The performance of New Zealand initial public offerings (IPOs): 1995-2000 / Arizza Sapuan
by: Sapuan, Arizza
Published: (2004)
by: Sapuan, Arizza
Published: (2004)
Forecast Errors and the Effect of Underwriter Reputation and Auditor Influence During Listing on IPOs
by: Mahussin, Norlida
Published: (2003)
by: Mahussin, Norlida
Published: (2003)
Fake review annotation model and classification through reviewers' writing style
by: Shojaee, Somayeh
Published: (2019)
by: Shojaee, Somayeh
Published: (2019)
Cyber Conflict and Just War Theory
by: Collie, Nicholas
Published: (2023)
by: Collie, Nicholas
Published: (2023)
Steganography in webpages using CSS color attributes enhanced by rule-based system
by: Nehzati, Seyedeh Sheida
Published: (2016)
by: Nehzati, Seyedeh Sheida
Published: (2016)
A study on determinants of bond yield in Malaysia / Nurul Jannah Arifin and Nurul Atikah Yaacob
by: Arifin, Nurul Jannah, et al.
Published: (2018)
by: Arifin, Nurul Jannah, et al.
Published: (2018)
Modified algorithm for image watermarking using 2D-DCT and elgamal cryptosystem / Nur Azien Yazid, Kamilah Abdullah and Suhaila Abd Halim
by: Yazid, Nur Azien, et al.
Published: (2019)
by: Yazid, Nur Azien, et al.
Published: (2019)
Modelling and simulation of improved scarani-acin-ribordy-GISIN-04 preprocessing technique
by: Mohd Nasir, Rinie Narinie
Published: (2015)
by: Mohd Nasir, Rinie Narinie
Published: (2015)
Information Security Outsourcing with System Interdependency and Mandatory Security Requirement
by: Hui, K., et al.
Published: (2013)
by: Hui, K., et al.
Published: (2013)
Social sukuk: a new mechanism to fund social services / Saadiah Mohamad … [et al.]
by: Mohamad, Saadiah, et al.
Published: (2017)
by: Mohamad, Saadiah, et al.
Published: (2017)
Security framework based multi agent system architecture to facilitate data fetching from cloud data storage
by: Mohamed, Amir Mohamed Talib
Published: (2012)
by: Mohamed, Amir Mohamed Talib
Published: (2012)
Kesedaran dan Amalan Keselamatan Komputer dan Internet di Kalangan Pegawai dan Penolong Pegawai Sistem Maklumat di Lima Kementerian Persekutuan di Malaysia
by: Kim, Ching Thoo
Published: (2002)
by: Kim, Ching Thoo
Published: (2002)
Cryptanalysis of El-Gamal AAs cryptosystem
by: Mandangan, Arif
Published: (2011)
by: Mandangan, Arif
Published: (2011)
Examining the factors influence bond market performance in Malaysia / Muhammad Syukri Mohd Jefri
by: Mohd Jefri, Muhammad Syukri
Published: (2018)
by: Mohd Jefri, Muhammad Syukri
Published: (2018)
Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things
by: Hadi, Ahmed Adnan
Published: (2022)
by: Hadi, Ahmed Adnan
Published: (2022)
Fair game: exploring the dynamics, perception and environmental impact of ‘surplus’ wild foods in England 10kya-present
by: Sykes, Naomi
Published: (2017)
by: Sykes, Naomi
Published: (2017)
An integrated anomaly intrusion detection scheme using statistical, hybridized classifiers and signature approach
by: Mohamed Yassin, Warusia
Published: (2015)
by: Mohamed Yassin, Warusia
Published: (2015)
Information security policy compliance model for government agency
by: Ramli, Muhamad Amirnazmi
Published: (2018)
by: Ramli, Muhamad Amirnazmi
Published: (2018)
Enhancing XSS vulnerability detection and removal in web applications using genetic algorithms
by: Hydara, Isatou
Published: (2024)
by: Hydara, Isatou
Published: (2024)
The types of bank that influencing the higher fixed deposit return for MD Tampin / Muhammad Hairee Ismail and Sharifah Zainab Qubra Al Attas
by: Ismail, Muhammad Hairee, et al.
Published: (2016)
by: Ismail, Muhammad Hairee, et al.
Published: (2016)
A new encryption algorithm over elliptic curve
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
A comparison of different technique in flow based anomaly detection
by: Salah, Mohammad
Published: (2017)
by: Salah, Mohammad
Published: (2017)
Improving intrusion detection for better anomaly detection based on x-means clustering and multi-layer perceptron classification
by: Abbas, Borkan Ahmed
Published: (2016)
by: Abbas, Borkan Ahmed
Published: (2016)
Kembangan pseudotnaf untuk pendaraban skalar di atas lenkuk koblitz
by: Yunos, Faridah
Published: (2014)
by: Yunos, Faridah
Published: (2014)
Similar Items
-
Multi-cyber framework for availability enhancement of cyber physical systems
by: Parvin, Sazia, et al.
Published: (2012) -
Cyber Risk Disclosure Practice in Top 10 U.S. Information Technology Companies: An Empirical Analysis
by: Al Lawati, Taha Mustafa Mohsin
Published: (2017) -
A survey on cyber security of CAV
by: He, Qiyi, et al.
Published: (2017) -
Modelling cyber-security experts' decision making processes using aggregation operators
by: Miller, Simon, et al.
Published: (2016) -
A human centric approach to unintentional insider threat: development of a sociotechnical framework
by: Khan, Neeshe
Published: (2023)