Robust Allocation of a Defensive Budget Considering an Attacker's Private Information: Robust Allocation of a Defensive Budget
|
journal
|
November 2011 |
Smart attacks in smart grid communication networks
|
journal
|
August 2012 |
Discrete game-theoretic analysis of defense in correlated cyber-physical systems
|
journal
|
September 2019 |
Cooperative Game Approach to Robust Control Design for Fuzzy Dynamical Systems
|
journal
|
July 2022 |
Secure Cyber-Physical Systems: Current trends, tools and open research problems
|
conference
|
March 2017 |
Cloud Storage Defense Against Advanced Persistent Threats: A Prospect Theoretic Study
|
journal
|
March 2017 |
Attacker-defender game from a network science perspective
|
journal
|
May 2018 |
Emergency medical services and beyond: Addressing new challenges through a wide literature review
|
journal
|
February 2017 |
Defense Strategies for Asymmetric Networked Systems with Discrete Components
|
journal
|
May 2018 |
Defense strategies for asymmetric networked systems under composite utilities
|
conference
|
November 2017 |
Reliability analysis of interconnection networks using hierarchical composition
|
journal
|
April 1989 |
Critical infrastructure protection using secrecy – A discrete simultaneous game
|
journal
|
April 2015 |
A survey on security control and attack detection for industrial cyber-physical systems
|
journal
|
January 2018 |
Attacker-Centric View of a Detection Game against Advanced Persistent Threats
|
journal
|
November 2018 |
Applying Complex Network Theory to the Vulnerability Assessment of Interdependent Energy Infrastructures
|
journal
|
January 2019 |
The Byzantine Generals Problem
|
journal
|
July 1982 |
Towards a systematic computational framework for modeling multi-agent decision-making at micro level for smart vehicles in a smart world
|
journal
|
October 2021 |
Cyber–Physical Correlation Effects in Defense Games for Large Discrete Infrastructures
|
journal
|
July 2018 |
Software Framework for Federated Science Instruments
|
book
|
January 2020 |
Protection-interdiction-restoration: Tri-level optimization for enhancing interdependent network resilience
|
journal
|
July 2020 |
Defense strategies and expected capacity of high performance computing infrastructures
|
conference
|
January 2019 |
Secure Estimation and Control for Cyber-Physical Systems Under Adversarial Attacks
|
journal
|
June 2014 |
Nonzero-Sum Game Reinforcement Learning for Performance Optimization in Large-Scale Industrial Processes
|
journal
|
September 2020 |
Game theory meets network security and privacy
|
journal
|
June 2013 |
Solving Defender-Attacker-Defender Models for Infrastructure Defense
|
conference
|
April 2011 |
Markov Game Analysis for Attack-Defense of Power Networks Under Possible Misinformation
|
journal
|
May 2013 |
On defense strategies for system of systems using aggregated correlations
|
conference
|
April 2017 |
Complexity of Computing Optimal Stackelberg Strategies in Security Resource Allocation Games
|
journal
|
July 2010 |
Prospect Theoretic Analysis of Energy Exchange Among Microgrids
|
journal
|
January 2015 |
Cloud Attack and Risk Assessment Taxonomy
|
journal
|
January 2015 |
Decentralized Game-Theoretic Scheme for D-EVSE Based on Renewable Energy in Smart Cities: A Realistic Scenario
|
journal
|
January 2020 |
Modelling ‘contracts’ between a terrorist group and a government in a sequential game
|
journal
|
June 2012 |
Technology Adoption, Accumulation, and Competition in Multiperiod Attacker-Defender Games
|
journal
|
September 2013 |
Secure Control: Towards Survivable Cyber-Physical Systems
- Cardenas, Alvaro A.; Amin, Saurabh; Sastry, Shankar
-
2008 28th International Conference on Distributed Computing Systems Workshops (ICDCS Workshops), 2008 The 28th International Conference on Distributed Computing Systems Workshops
https://doi.org/10.1109/ICDCS.Workshops.2008.40
|
conference
|
June 2008 |
Survey of advances and challenges in intelligent autonomy for distributed cyber‐physical systems
|
journal
|
June 2018 |
A Survey of Advanced Persistent Threats Attack and Defense
|
conference
|
October 2021 |
Weakest-link attacker-defender games with multiple attack technologies
|
journal
|
July 2012 |
Generalized contest success functions
|
journal
|
January 2008 |
Contest success functions
|
journal
|
June 1996 |
Defense and attack for interdependent systems
|
journal
|
January 2017 |
Model-based evaluation: from dependability to security
|
journal
|
January 2004 |
Defense Strategies for Multi-Site Cloud Computing Server Infrastructures
- Rao, Nageswara S. V.; Ma, Chris Y. T.; He, Fei
-
ICDCN '18: 19th International Conference on Distributed Computing and Networking, Proceedings of the 19th International Conference on Distributed Computing and Networking
https://doi.org/10.1145/3154273.3154344
|
conference
|
January 2018 |
A Sequential Game of Defense and Attack on an Interdependent System of Systems
- He, Fei; Agwuegbo, Chiamaka; Rao, Nageswara S. V.
-
2018 International Conference on Information Fusion (FUSION), 2018 21st International Conference on Information Fusion (FUSION)
https://doi.org/10.23919/ICIF.2018.8455314
|
conference
|
July 2018 |
Security Threats in 5G Edge Computing Environments
|
conference
|
October 2020 |
A game theoretic model for resource allocation among countermeasures with multiple attributes
|
journal
|
July 2016 |
Noncooperative and Cooperative Optimization of Distributed Energy Generation and Storage in the Demand-Side of the Smart Grid
|
journal
|
May 2013 |
Security Games With Unknown Adversarial Strategies
|
journal
|
October 2016 |
Interdependence-Aware Game-Theoretic Framework for Secure Intelligent Transportation Systems
|
journal
|
November 2021 |
Hybrid defensive resource allocations in the face of partially strategic attackers in a sequential defender–attacker game
|
journal
|
July 2013 |
Defense of Cyber Infrastructures Against Cyber-Physical Attacks Using Game-Theoretic Models: Defense of Cyber Infrastructures Against Cyber-Physical Attacks
|
journal
|
February 2015 |
A mathematical framework to optimize resilience of interdependent critical infrastructure systems under spatially localized attacks
|
journal
|
November 2017 |
Effects of Interdependencies on Game-Theoretic Defense of Cyber-Physical Infrastructures
|
conference
|
July 2019 |
Scalable Solutions of Markov Games for Smart-Grid Infrastructure Protection
|
journal
|
March 2013 |
On the Effectiveness of Security Countermeasures for Critical Infrastructures
|
journal
|
December 2014 |
On Defense Strategies for Recursive System of Systems Using Aggregated Correlations
|
conference
|
July 2018 |
Cyber-Physical Systems Security—A Survey
|
journal
|
December 2017 |
Attack Detection and Identification in Cyber-Physical Systems
|
journal
|
November 2013 |
Internet of vehicles: From intelligent grid to autonomous cars and vehicular clouds
|
conference
|
March 2014 |
Defending Critical Infrastructure
|
journal
|
December 2006 |
Complex networks: Structure and dynamics
|
journal
|
February 2006 |
Stackelberg game in critical infrastructures from a network science perspective
|
journal
|
May 2019 |
Mobile edge computing, Fog et al.: A survey and analysis of security threats and challenges
|
journal
|
January 2018 |
Game theory for cyber security
|
conference
|
April 2010 |