Skip to main content

Research Repository

Advanced Search

The Work-Averse Cyber Attacker Model: Theory and Evidence From Two Million Attack Signatures (2017)
Working Paper
Allodi, L., Massacci, F., & Williams, J. (2017). The Work-Averse Cyber Attacker Model: Theory and Evidence From Two Million Attack Signatures

A common presumption is that the typical cyber attacker is assumed to exploit all possible vulnerabilities with almost equal likelihood. That is, the probability of an attack on a given vulnerability is at maximum entropy, one cannot importance sampl... Read More about The Work-Averse Cyber Attacker Model: Theory and Evidence From Two Million Attack Signatures.