Dynamic games in cyber-physical security: An overview

SR Etesami, T Başar - Dynamic Games and Applications, 2019 - Springer
Due to complex dependencies between multiple layers and components of emerging cyber-
physical systems, security and vulnerability of such systems have become a major challenge …

Flip the cloud: Cyber-physical signaling games in the presence of advanced persistent threats

J Pawlick, S Farhang, Q Zhu - Decision and Game Theory for Security: 6th …, 2015 - Springer
Access to the cloud has the potential to provide scalable and cost effective enhancements of
physical devices through the use of advanced computational processes run on apparently …

Strategic trust in cloud-enabled cyber-physical systems with an application to glucose control

J Pawlick, Q Zhu - IEEE Transactions on Information Forensics …, 2017 - ieeexplore.ieee.org
Advances in computation, sensing, and networking have led to interest in the Internet of
Things (IoT) and cyber-physical systems (CPS). Developments concerning the IoT and CPS …

Strategic defense against stealthy link flooding attacks: A signaling game approach

A Aydeger, MH Manshaei, MA Rahman… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
With the increasing diversity of Distributed Denial-of-Service (DDoS) attacks, it is becoming
extremely challenging to design a fully protected network. For instance, Stealthy Link …

Deception, identity, and security: the game theory of sybil attacks

W Casey, A Kellner, P Memarmoshrefi… - Communications of the …, 2018 - dl.acm.org
Deception, identity, and security: the game theory of sybil attacks Page 1 JANUARY 2019 |
VOL. 62 | NO. 1 | COMMUNICATIONS OF THE ACM 85 Deception, Identity, and Security …

Strategic defense against deceptive civilian GPS spoofing of unmanned aerial vehicles

T Zhang, Q Zhu - Decision and Game Theory for Security: 8th …, 2017 - Springer
Abstract The Global Positioning System (GPS) is commonly used in civilian Unmanned
Aerial Vehicles (UAVs) to provide geolocation and time information for navigation. However …

Compliance signaling games: toward modeling the deterrence of insider threats

W Casey, JA Morales, E Wright, Q Zhu… - Computational and …, 2016 - Springer
In a typical workplace, organizational policies and their compliance requirements set the
stage upon which the behavioral patterns of individual agents evolve. The agents' personal …

Optimal thresholds for anomaly-based intrusion detection in dynamical environments

A Ghafouri, W Abbas, A Laszka, Y Vorobeychik… - Decision and Game …, 2016 - Springer
In cyber-physical systems, malicious and resourceful attackers could penetrate a system
through cyber means and cause significant physical damage. Consequently, early detection …

A privacy‐preserving mechanism for social mobile crowdsensing using game theory

R Esmaeilyfard, R Esmaili - Transactions on Emerging …, 2022 - Wiley Online Library
Smartphones and mobile networks have created a new paradigm called mobile
crowdsensing for data gathering and processing about a large‐scale phenomenon. This …

Compliance control: Managed vulnerability surface in social-technological systems via signaling games

WA Casey, Q Zhu, JA Morales, B Mishra - Proceedings of the 7th ACM …, 2015 - dl.acm.org
The agents of an organization, in fulfillment of their tasks, generate a cyber-physical-human
trace, which is amenable to formal analysis with modal logic to verify safety and liveness …