The Work-Averse Cyber Attacker Model: Theory and Evidence From Two Million Attack Signatures
(2017)
Working Paper
Allodi, L., Massacci, F., & Williams, J. (2017). The Work-Averse Cyber Attacker Model: Theory and Evidence From Two Million Attack Signatures
A common presumption is that the typical cyber attacker is assumed to exploit all possible vulnerabilities with almost equal likelihood. That is, the probability of an attack on a given vulnerability is at maximum entropy, one cannot importance sampl... Read More about The Work-Averse Cyber Attacker Model: Theory and Evidence From Two Million Attack Signatures.