Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Dynamic games in cyber-physical security: An overview
Due to complex dependencies between multiple layers and components of emerging cyber-
physical systems, security and vulnerability of such systems have become a major challenge …
physical systems, security and vulnerability of such systems have become a major challenge …
Flip the cloud: Cyber-physical signaling games in the presence of advanced persistent threats
Access to the cloud has the potential to provide scalable and cost effective enhancements of
physical devices through the use of advanced computational processes run on apparently …
physical devices through the use of advanced computational processes run on apparently …
Strategic trust in cloud-enabled cyber-physical systems with an application to glucose control
Advances in computation, sensing, and networking have led to interest in the Internet of
Things (IoT) and cyber-physical systems (CPS). Developments concerning the IoT and CPS …
Things (IoT) and cyber-physical systems (CPS). Developments concerning the IoT and CPS …
Strategic defense against stealthy link flooding attacks: A signaling game approach
With the increasing diversity of Distributed Denial-of-Service (DDoS) attacks, it is becoming
extremely challenging to design a fully protected network. For instance, Stealthy Link …
extremely challenging to design a fully protected network. For instance, Stealthy Link …
Deception, identity, and security: the game theory of sybil attacks
Deception, identity, and security: the game theory of sybil attacks Page 1 JANUARY 2019 |
VOL. 62 | NO. 1 | COMMUNICATIONS OF THE ACM 85 Deception, Identity, and Security …
VOL. 62 | NO. 1 | COMMUNICATIONS OF THE ACM 85 Deception, Identity, and Security …
Strategic defense against deceptive civilian GPS spoofing of unmanned aerial vehicles
Abstract The Global Positioning System (GPS) is commonly used in civilian Unmanned
Aerial Vehicles (UAVs) to provide geolocation and time information for navigation. However …
Aerial Vehicles (UAVs) to provide geolocation and time information for navigation. However …
Compliance signaling games: toward modeling the deterrence of insider threats
In a typical workplace, organizational policies and their compliance requirements set the
stage upon which the behavioral patterns of individual agents evolve. The agents' personal …
stage upon which the behavioral patterns of individual agents evolve. The agents' personal …
Optimal thresholds for anomaly-based intrusion detection in dynamical environments
In cyber-physical systems, malicious and resourceful attackers could penetrate a system
through cyber means and cause significant physical damage. Consequently, early detection …
through cyber means and cause significant physical damage. Consequently, early detection …
A privacy‐preserving mechanism for social mobile crowdsensing using game theory
R Esmaeilyfard, R Esmaili - Transactions on Emerging …, 2022 - Wiley Online Library
Smartphones and mobile networks have created a new paradigm called mobile
crowdsensing for data gathering and processing about a large‐scale phenomenon. This …
crowdsensing for data gathering and processing about a large‐scale phenomenon. This …
Compliance control: Managed vulnerability surface in social-technological systems via signaling games
The agents of an organization, in fulfillment of their tasks, generate a cyber-physical-human
trace, which is amenable to formal analysis with modal logic to verify safety and liveness …
trace, which is amenable to formal analysis with modal logic to verify safety and liveness …