|
Taguchi methods: Some technical, cultural and pedagogical perspectives
|
journal
|
May 1993 |
|
Principles of robust design methodology
|
journal
|
June 2007 |
|
Adaptive Game Playing Using Multiplicative Weights
|
journal
|
October 1999 |
|
On stochastic games with additive reward and transition structure
|
journal
|
December 1985 |
|
TD(?) converges with probability 1
|
journal
|
March 1994 |
|
On pure stationary almost Markov Nash equilibria in nonzero-sum ARAT stochastic games
|
journal
|
January 2015 |
|
A survey of deep learning-based network anomaly detection
|
journal
|
September 2017 |
|
Robust optimization with simulated annealing
|
journal
|
December 2009 |
|
A Bayesian optimization approach to find Nash equilibria
|
journal
|
July 2018 |
|
Active authentication with reinforcement learning based on ambient radio signals
|
journal
|
October 2015 |
|
A systems and control perspective of CPS security
|
journal
|
January 2019 |
|
A review of attack graph and attack tree visual syntax in cyber security
|
journal
|
February 2020 |
|
Impact of the controller model complexity on model predictive control performance for buildings
|
journal
|
October 2017 |
|
Reinforcement learning algorithms with function approximation: Recent advances and applications
|
journal
|
March 2014 |
|
State of the art of cyber-physical systems security: An automatic control perspective
|
journal
|
March 2019 |
|
Towards a framework of enforcing resilient operation of cyber‐physical systems with unknown dynamics
|
journal
|
April 2021 |
|
News Briefing: Cyber security - Ukraine grid hack is wake-up call for network operators
|
journal
|
February 2016 |
|
A Bayesian Optimization Approach to Compute Nash Equilibrium of Potential Games Using Bandit Feedback
|
journal
|
December 2019 |
|
A Vulnerability Assessment Method in Industrial Internet of Things Based on Attack Graph and Maximum Flow
|
journal
|
January 2018 |
|
Secure Contingency Prediction and Response for Cyber-Physical Systems
|
conference
|
August 2020 |
|
DIFT Games: Dynamic Information Flow Tracking Games for Advanced Persistent Threats
|
conference
|
December 2018 |
|
Learning the Associations of MITRE ATT & CK Adversarial Techniques
|
conference
|
June 2020 |
|
A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection
|
journal
|
July 2016 |
|
Resilient Machine Learning for Networked Cyber Physical Systems: A Survey for Machine Learning Security to Securing Machine Learning for CPS
|
journal
|
January 2021 |
|
An Advanced Persistent Threat (APT)-Style Cyberattack Testbed for Distributed Energy Resources (DER)
|
conference
|
July 2021 |
|
Anti-Jamming Communication Game for UAV-Aided VANETs
|
conference
|
December 2017 |
|
FlipNet: Modeling Covert and Persistent Attacks on Networked Resources
|
conference
|
June 2017 |
|
Generalization of Deep Learning for Cyber-Physical System Security: A Survey
|
conference
|
October 2018 |
|
A Cyber Kill Chain Model for Distributed Energy Resources (DER) Aggregation Systems
|
conference
|
February 2021 |
|
Automated Adversary Emulation for Cyber-Physical Systems via Reinforcement Learning
|
conference
|
November 2020 |
|
Using hybrid attack graphs to model cyber-physical attacks in the Smart Grid
|
conference
|
August 2012 |
|
Stuxnet: Dissecting a Cyberwarfare Weapon
|
journal
|
May 2011 |
|
A model-based approach to security analysis for cyber-physical systems
|
conference
|
April 2018 |
|
Coding Schemes for Securing Cyber-Physical Systems Against Stealthy Data Injection Attacks
|
journal
|
March 2017 |
|
Identifying vulnerabilities and hardening attack graphs for networked systems
|
conference
|
May 2016 |
|
Q-Learning-Based Vulnerability Analysis of Smart Grid Against Sequential Topology Attacks
|
journal
|
January 2017 |
|
Information-Theoretic Regret Bounds for Gaussian Process Optimization in the Bandit Setting
|
journal
|
May 2012 |
|
A Multistage Game in Smart Grid Security: A Reinforcement Learning Solution
|
journal
|
September 2019 |
|
Deep Reinforcement Learning for Cyber Security
|
journal
|
August 2023 |
|
Petri Net Modeling of Cyber-Physical Attacks on Smart Grid
|
journal
|
December 2011 |
|
Power System Reliability Assessment Incorporating Cyber Attacks Against Wind Farm Energy Management Systems
|
journal
|
September 2017 |
|
Evaluation of Reinforcement Learning-Based False Data Injection Attack to Automatic Voltage Control
|
journal
|
March 2019 |
|
PHY-Layer Spoofing Detection With Reinforcement Learning in Wireless Networks
|
journal
|
December 2016 |
|
DQN-Based Power Control for IoT Transmission against Jamming
|
conference
|
June 2018 |
|
Dynamic Noncooperative Game Theory, 2nd Edition
|
book
|
January 1998 |
|
Secure program execution via dynamic information flow tracking
|
journal
|
October 2004 |
|
Fast gradient-descent methods for temporal-difference learning with linear function approximation
|
conference
|
June 2009 |
|
Toward hybrid attack dependency graphs
|
conference
|
October 2011 |
|
Optimal Defense Policies for Partially Observable Spreading Processes on Bayesian Attack Graphs
|
conference
|
October 2015 |
|
Probabilistic Attack Sequence Generation and Execution Based on MITRE ATT&CK for ICS Datasets
|
conference
|
August 2021 |
|
Attack net penetration testing
|
conference
|
January 2000 |
|
Scalable, graph-based network vulnerability analysis
|
conference
|
November 2002 |
|
Nonconvex Robust Optimization for Problems with Constraints
|
journal
|
February 2010 |
|
Robust Optimization for Unconstrained Simulation-Based Problems
|
journal
|
February 2010 |
|
Designing Fast Absorbing Markov Chains
|
journal
|
June 2014 |
|
Automatic Hybrid Attack Graph (AHAG) Generation for Complex Engineering Systems
|
journal
|
November 2019 |