[PDF][PDF] Dynamic games for secure and resilient control system design

Y Huang, J Chen, L Huang, Q Zhu - National Science Review, 2020 - academic.oup.com
Modern control systems are featured by their hierarchical structure composed of cyber,
physical and human layers. The intricate dependencies among multiple layers and units of …

Game theory meets network security: A tutorial

Q Zhu, S Rass - Proceedings of the 2018 ACM SIGSAC conference on …, 2018 - dl.acm.org
The increasingly pervasive connectivity of today's information systems brings up new
challenges to security. Traditional security has accomplished a long way toward protecting …

Symbiotic game and foundation models for cyber deception operations in strategic cyber warfare

T Li, Q Zhu - arxiv preprint arxiv:2403.10570, 2024 - arxiv.org
We are currently facing unprecedented cyber warfare with the rapid evolution of tactics,
increasing asymmetry of intelligence, and the growing accessibility of hacking tools. In this …

AFPr-AM: A novel Fuzzy-AHP based privacy risk assessment model for strategic information management of social media platforms

MT Ahvanooey, MX Zhu, S Ou, HD Mazraeh… - Computers & …, 2023 - Elsevier
Abstract Social Media Platforms (SMPs) have changed how we communicate, share, and
obtain information. However, this also comes at a cost, as users (willingly) share their …

Peran kamera pengawas closed-circuit television (cctv) dalam kontra terorisme

GRCK BP - Jurnal Lemhannas RI, 2021 - jurnal.lemhannas.go.id
Kemajuan teknologi membuat aksi terorisme semakin sulit terdeteksi sehingga
membutuhkan teknologi sepadan sebagai upaya kontra terorisme. Surveillance atau …

Game theoretical modelling of network/cybersecurity

A Iqbal, LJ Gunn, M Guo, MA Babar, D Abbott - IEEE Access, 2019 - ieeexplore.ieee.org
Game theory is an established branch of mathematics that offers a rich set of mathematical
tools for multi-person strategic decision making that can be used to model the interactions of …

A comprehensive insight into game theory in relevance to cyber security

F Anwar, BUII Khan, RF Olanrewaju… - … Journal of Electrical …, 2020 - section.iaesonline.com
The progressively ubiquitous connectivity in the present information systems pose newer
challenges tosecurity. The conventional security mechanisms have come a long way in …

[HTML][HTML] Sustainable Collaboration and Incentive Policies for the Integration of Professional Education and Innovation and Entrepreneurship Education (IPEIEE)

H Chen, G Fu, H Wu, Y **ao, X Nie, W Zhao - Sustainability, 2024 - mdpi.com
The Integration of Professional Education and Innovation and Entrepreneurship Education
(IPEIEE) has been recognized as an important direction for the development of higher …

A Quantal Response Analysis of Human Decision-Making in Interdependent Security Games Modeled by Attack Graphs

MRS Azim, T Cason, M Abdallah - IEEE Access, 2024 - ieeexplore.ieee.org
Interdependent systems, under the management of multiple decision-makers, confront
rapidly growing cybersecurity threats. This paper delves into the realm of security decision …

Honeyquest: Rapidly measuring the enticingness of cyber deception techniques with code-based questionnaires

M Kahlhofer, S Achleitner, S Rass… - Proceedings of the 27th …, 2024 - dl.acm.org
Fooling adversaries with traps such as honeytokens can slow down cyber attacks and create
strong indicators of compromise. Unfortunately, cyber deception techniques are often poorly …