Game theory meets network security and privacy

MH Manshaei, Q Zhu, T Alpcan, T Bacşar… - ACM Computing …, 2013 - dl.acm.org
This survey provides a structured and comprehensive overview of research on security and
privacy in computer and communication networks that use game-theoretic approaches. We …

A game-theoretic taxonomy and survey of defensive deception for cybersecurity and privacy

J Pawlick, E Colbert, Q Zhu - ACM Computing Surveys (CSUR), 2019 - dl.acm.org
Cyberattacks on both databases and critical infrastructure have threatened public and
private sectors. Ubiquitous tracking and wearable computing have infringed upon privacy …

Detecting integrity attacks on SCADA systems

Y Mo, R Chabukswar, B Sinopoli - IEEE Transactions on …, 2013 - ieeexplore.ieee.org
Ensuring security of systems based on supervisory control and data acquisition is a major
challenge. The goal of this paper is to develop the model-based techniques capable of …

[KİTAP][B] Network security: A decision and game-theoretic approach

T Alpcan, T Başar - 2010 - books.google.com
Covering attack detection, malware response, algorithm and mechanism design, privacy,
and risk management, this comprehensive work applies unique quantitative models derived …

Synchrony in networked microgrids under attacks

S Abhinav, H Modares, FL Lewis… - … on Smart Grid, 2017 - ieeexplore.ieee.org
This paper proposes attack-resilient distributed control for synchronization of islanded,
networked, inverter-based microgrids. Existing cooperative control techniques are …

[KİTAP][B] Network intrusion detection and prevention: concepts and techniques

AA Ghorbani, W Lu, M Tavallaee - 2009 - books.google.com
With the complexity of today's networks, it is impossible to know you are actually secure. You
can prepare your network's defenses, but what threats will be thrown at it, what combinations …

Behavioral analysis of insider threat: A survey and bootstrapped prediction in imbalanced data

A Azaria, A Richardson, S Kraus… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
The problem of insider threat is receiving increasing attention both within the computer
science community as well as government and industry. This paper starts by presenting a …

Resilient and robust synchronization of multiagent systems under attacks on sensors and actuators

H Modares, B Kiumarsi, FL Lewis… - IEEE transactions on …, 2019 - ieeexplore.ieee.org
Resilient and robust distributed control protocols for multiagent systems under attacks on
sensors and actuators are designed. A distributed H∞ control protocol is designed to …

Dynamic defense strategy against advanced persistent threat with insiders

P Hu, H Li, H Fu, D Cansever… - 2015 IEEE Conference …, 2015 - ieeexplore.ieee.org
The landscape of cyber security has been reformed dramatically by the recently emerging
Advanced Persistent Threat (APT). It is uniquely featured by the stealthy, continuous …

Quantified security is a weak hypothesis: a critical survey of results and assumptions

V Verendel - Proceedings of the 2009 workshop on New security …, 2009 - dl.acm.org
This paper critically surveys previous work on quantitative representation and analysis of
security. Such quantified security has been presented as a general approach to precisely …