Dynamic games in cyber-physical security: An overview
SR Etesami, T Başar - Dynamic Games and Applications, 2019 - Springer
Due to complex dependencies between multiple layers and components of emerging cyber-
physical systems, security and vulnerability of such systems have become a major challenge …
physical systems, security and vulnerability of such systems have become a major challenge …
[PDF][PDF] Dynamic games for secure and resilient control system design
Modern control systems are featured by their hierarchical structure composed of cyber,
physical and human layers. The intricate dependencies among multiple layers and units of …
physical and human layers. The intricate dependencies among multiple layers and units of …
Flip the cloud: Cyber-physical signaling games in the presence of advanced persistent threats
Access to the cloud has the potential to provide scalable and cost effective enhancements of
physical devices through the use of advanced computational processes run on apparently …
physical devices through the use of advanced computational processes run on apparently …
Adaptive honeypot engagement through reinforcement learning of semi-markov decision processes
A honeynet is a promising active cyber defense mechanism. It reveals the fundamental
Indicators of Compromise (IoCs) by luring attackers to conduct adversarial behaviors in a …
Indicators of Compromise (IoCs) by luring attackers to conduct adversarial behaviors in a …
Cybersecurity in robotics: Challenges, quantitative modeling, and practice
Robotics is becoming more and more ubiquitous, but the pressure to bring systems to
market occasionally goes at the cost of neglecting security mechanisms during the …
market occasionally goes at the cost of neglecting security mechanisms during the …
Dynamic bayesian games for adversarial and defensive cyber deception
Security challenges accompany the efficiency. The pervasive integration of information and
communications technologies (ICTs) makes cyber-physical systems vulnerable to targeted …
communications technologies (ICTs) makes cyber-physical systems vulnerable to targeted …
Deception by design: evidence-based signaling games for network defense
Deception plays a critical role in the financial industry, online markets, national defense, and
countless other areas. Understanding and harnessing deception-especially in cyberspace-is …
countless other areas. Understanding and harnessing deception-especially in cyberspace-is …
Game theory meets network security: A tutorial
The increasingly pervasive connectivity of today's information systems brings up new
challenges to security. Traditional security has accomplished a long way toward protecting …
challenges to security. Traditional security has accomplished a long way toward protecting …
Security of multi-agent cyber-physical systems: A survey
Multi-agent systems are becoming increasingly popular due to their successful
implementation in several sectors. However, there are a variety of threats that might …
implementation in several sectors. However, there are a variety of threats that might …
FlipLeakage: a game-theoretic approach to protect against stealthy attackers in the presence of information leakage
S Farhang, J Grossklags - Decision and Game Theory for Security: 7th …, 2016 - Springer
One of the particularly daunting issues in the cybersecurity domain is information leakage of
business or consumer data, which is often triggered by multi-stage attacks and advanced …
business or consumer data, which is often triggered by multi-stage attacks and advanced …