Cyber-physical systems (CPS) security: state of the art and research opportunities for information systems academics

C Kumar, S Marston, R Sen - Communications of the Association for …, 2020 - aisel.aisnet.org
Attacks on cyber-physical systems (CPS) continue to grow in frequency. However,
cybersecurity academics and practitioners have so far focused primarily on computer …

Interdependent network recovery games

AM Smith, AD González, L Dueñas‐Osorio… - Risk …, 2020 - Wiley Online Library
Recovery of interdependent infrastructure networks in the presence of catastrophic failure is
crucial to the economy and welfare of society. Recently, centralized methods have been …

Adaptive algorithm for dependent infrastructure network restoration in an imperfect information sharing environment

A Rangrazjeddi, AD González, K Barker - Plos one, 2022 - journals.plos.org
Critical infrastructure networks are vital for a functioning society and their failure can have
widespread consequences. Decision-making for critical infrastructure resilience can suffer …

Adversarial regression with multiple learners

L Tong, S Yu, S Alfeld - International Conference on …, 2018 - proceedings.mlr.press
Despite the considerable success enjoyed by machine learning techniques in practice,
numerous studies demonstrated that many approaches are vulnerable to attacks. An …

Stackelberg security games with multiple uncoordinated defenders

J Gan, E Elkind, M Wooldridge - … of the 17th international conference on …, 2018 - ora.ox.ac.uk
Stackelberg security games have received much attention in recent years. While most
existing work focuses on single-defender settings, there are many real-world scenarios that …

[PDF][PDF] Verification of stochastic multi-agent systems with forgetful strategies

F Belardinelli, W Jamroga… - Proceedings of the …, 2024 - aamas.csc.liv.ac.uk
Formal methods for strategic reasoning play a fundamental role in Multi-Agent System
(MAS) design and verification [3, 16, 56, 67, 71, 77, 79]. This success story originated from …

Optimal and game-theoretic deployment of security investments in interdependent assets

AR Hota, AA Clements, S Sundaram… - … Conference on Decision …, 2016 - Springer
We introduce a game-theoretic framework to compute optimal and strategic security
investments by multiple defenders. Each defender is responsible for the security of multiple …

[HTML][HTML] Coevolution of players strategies in security games

A Żychowski, J Mańdziuk - Journal of Computational Science, 2023 - Elsevier
Abstract Stackelberg Security Games (SSGs) gained recently a lot of attention and popularity
due to a bunch of successful practical applications in the field of security maintenance. SSGs …

A unified framework for multistage mixed integer linear optimization

S Bolusani, S Coniglio, TK Ralphs… - … : Advances and next …, 2020 - Springer
We introduce a unified framework for the study of multilevel mixed integer linear optimization
problems and multistage stochastic mixed integer linear optimization problems with …

Share: A stackelberg honey-based adversarial reasoning engine

S Jajodia, N Park, E Serra… - ACM Transactions on …, 2018 - dl.acm.org
A “noisy-rich”(NR) cyber-attacker (Lippmann et al. 2012) is one who tries all available
vulnerabilities until he or she successfully compromises the targeted network. We develop …