Game theory for cyber security and privacy
In this survey, we review the existing game-theoretic approaches for cyber security and
privacy issues, categorizing their application into two classes, security and privacy. To show …
privacy issues, categorizing their application into two classes, security and privacy. To show …
A game-theoretic analysis of cyber switching attacks and mitigation in smart grid systems
We propose a framework for the analysis of cyber switching attacks and control-based
mitigation in cyber-enabled power systems. Our model of the switching attack is simple, only …
mitigation in cyber-enabled power systems. Our model of the switching attack is simple, only …
Modeling security in cyber–physical systems
M Burmester, E Magkos, V Chrissikopoulos - International journal of critical …, 2012 - Elsevier
This paper describes a framework for modeling the security of a cyber–physical system in
which the behavior of the adversary is controlled by a threat model that captures–in a unified …
which the behavior of the adversary is controlled by a threat model that captures–in a unified …
Quantitative verification and synthesis of attack-defence scenarios
Attack-defence trees are a powerful technique for formally evaluating attack-defence
scenarios. They represent in an intuitive, graphical way the interaction between an attacker …
scenarios. They represent in an intuitive, graphical way the interaction between an attacker …
A game-theoretic approach to model and quantify the security of cyber-physical systems
The security of cyber-physical systems (CPSs) has become an active research area in
recent years. The goal of attackers in these systems is often disrupting physical processes …
recent years. The goal of attackers in these systems is often disrupting physical processes …
Defense of cyber infrastructures against cyber‐physical attacks using game‐theoretic models
The operation of cyber infrastructures relies on both cyber and physical components, which
are subject to incidental and intentional degradations of different kinds. Within the context of …
are subject to incidental and intentional degradations of different kinds. Within the context of …
Modeling cyber-physical attacks based on stochastic game and Markov processes
KC Lalropuia, V Gupta - Reliability Engineering & System Safety, 2019 - Elsevier
Security of cyber-physical systems (CPS) has been a prime concern due to the ever-
increasing integration of communication networks with physical devices. In this paper, we …
increasing integration of communication networks with physical devices. In this paper, we …
A hybrid game theory and reinforcement learning approach for cyber-physical systems security
Intentional electromagnetic interference attacks (eg, jamming) against wireless connected
devices such as the Internet of Things (IoT) remain a serious challenge, especially as such …
devices such as the Internet of Things (IoT) remain a serious challenge, especially as such …