Table 1 Overview of adaptive security modeling approaches and limitations.

From: Mathematical modeling of adaptive information security strategies using composite behavior models

Model type

Behavioral focus

Adaptability level

Primary limitation

Signature/rule-based3

Static threat pattern

Low

Ineffective against a zero-day attack

Statistical anomaly7

Simple heuristics

Moderate

High false positives in noisy data

Game-theoretic8[,9

Strategic interaction

Moderate

Often assume fixed player strategies

Machine learning10[,11

Data-driven pattern

High

Requires large labeled datasets and explainability issues