Game theory meets network security and privacy

MH Manshaei, Q Zhu, T Alpcan, T Bacşar… - ACM Computing …, 2013 - dl.acm.org
This survey provides a structured and comprehensive overview of research on security and
privacy in computer and communication networks that use game-theoretic approaches. We …

An overview on denial-of-service attacks in control systems: Attack models and security analyses

A Cetinkaya, H Ishii, T Hayakawa - Entropy, 2019 - mdpi.com
In this paper, we provide an overview of recent research efforts on networked control
systems under denial-of-service attacks. Our goal is to discuss the utility of different attack …

Jamming attacks on remote state estimation in cyber-physical systems: A game-theoretic approach

Y Li, L Shi, P Cheng, J Chen… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
We consider security issues in remote state estimation of Cyber-Physical Systems (CPS). A
sensor node communicates with a remote estimator through a wireless channel which may …

Cyber–physical security of a smart grid infrastructure

Y Mo, THJ Kim, K Brancik, D Dickinson… - Proceedings of the …, 2011 - ieeexplore.ieee.org
It is often appealing to assume that existing solutions can be directly applied to emerging
engineering domains. Unfortunately, careful investigation of the unique challenges …

Game-theoretic methods for robustness, security, and resilience of cyberphysical control systems: games-in-games principle for optimal cross-layer resilient control …

Q Zhu, T Basar - IEEE Control Systems Magazine, 2015 - ieeexplore.ieee.org
Critical infrastructures, such as power grids and transportation systems, are increasingly
using open networks for operation. The use of open networks poses many challenges for …

SINR-based DoS attack on remote state estimation: A game-theoretic approach

Y Li, DE Quevedo, S Dey, L Shi - IEEE Transactions on Control …, 2016 - ieeexplore.ieee.org
We consider remote state estimation of cyberphysical systems under signal-to-interference-
plus-noise ratio-based denial-of-service attacks. A sensor sends its local estimate to a …

[HTML][HTML] Decision support approaches for cyber security investment

A Fielder, E Panaousis, P Malacaria, C Hankin… - Decision support …, 2016 - Elsevier
When investing in cyber security resources, information security managers have to follow
effective decision-making strategies. We refer to this as the cyber security investment …

[BOK][B] Security and privacy in cyber-physical systems: foundations, principles, and applications

H Song, GA Fink, S Jeschke - 2017 - books.google.com
Written by a team of experts at the forefront of the cyber-physical systems (CPS) revolution,
this book provides an in-depth look at security and privacy, two of the most critical …

Detection against linear deception attacks on multi-sensor remote state estimation

Y Li, L Shi, T Chen - IEEE Transactions on Control of Network …, 2017 - ieeexplore.ieee.org
In this paper, a security problem in cyberphysical systems (CPS) is studied. A remote state
estimation process using multiple sensors is considered. The measurement innovation …

False data injection attacks on networked control systems: A Stackelberg game analysis

Y Li, D Shi, T Chen - IEEE Transactions on Automatic Control, 2018 - ieeexplore.ieee.org
In this paper, a security problem in networked control systems (NCS) is studied. In a
standard linear quadratic Gaussian (LQG) control scenario in NCS, a so-called false data …