Search Results for author: Sakshyam Panda

Found 2 papers, 1 papers with code

Principled Data-Driven Decision Support for Cyber-Forensic Investigations

1 code implementation23 Nov 2022 Soodeh Atefi, Sakshyam Panda, Emmanouil Panaousis, Aron Laszka

A recent study demonstrated that data-driven decision support, based on a dataset of prior incidents, can provide state-of-the-art prioritization.

HoneyCar: A Framework to Configure HoneypotVulnerabilities on the Internet of Vehicles

no code implementations3 Nov 2021 Sakshyam Panda, Stefan Rass, Sotiris Moschoyiannis, Kaitai Liang, George Loukas, Emmanouil Panaousis

By taking a game-theoretic approach, we model the adversarial interaction as a repeated imperfect-information zero-sum game in which the IoV network administrator chooses a set of vulnerabilities to offer in a honeypot and a strategic attacker chooses a vulnerability of the IoV to exploit under uncertainty.

Cannot find the paper you are looking for? You can Submit a new open access paper.