Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Game theory meets network security and privacy
This survey provides a structured and comprehensive overview of research on security and
privacy in computer and communication networks that use game-theoretic approaches. We …
privacy in computer and communication networks that use game-theoretic approaches. We …
An overview on denial-of-service attacks in control systems: Attack models and security analyses
In this paper, we provide an overview of recent research efforts on networked control
systems under denial-of-service attacks. Our goal is to discuss the utility of different attack …
systems under denial-of-service attacks. Our goal is to discuss the utility of different attack …
Jamming attacks on remote state estimation in cyber-physical systems: A game-theoretic approach
We consider security issues in remote state estimation of Cyber-Physical Systems (CPS). A
sensor node communicates with a remote estimator through a wireless channel which may …
sensor node communicates with a remote estimator through a wireless channel which may …
Cyber–physical security of a smart grid infrastructure
It is often appealing to assume that existing solutions can be directly applied to emerging
engineering domains. Unfortunately, careful investigation of the unique challenges …
engineering domains. Unfortunately, careful investigation of the unique challenges …
Game-theoretic methods for robustness, security, and resilience of cyberphysical control systems: games-in-games principle for optimal cross-layer resilient control …
Critical infrastructures, such as power grids and transportation systems, are increasingly
using open networks for operation. The use of open networks poses many challenges for …
using open networks for operation. The use of open networks poses many challenges for …
SINR-based DoS attack on remote state estimation: A game-theoretic approach
We consider remote state estimation of cyberphysical systems under signal-to-interference-
plus-noise ratio-based denial-of-service attacks. A sensor sends its local estimate to a …
plus-noise ratio-based denial-of-service attacks. A sensor sends its local estimate to a …
[HTML][HTML] Decision support approaches for cyber security investment
When investing in cyber security resources, information security managers have to follow
effective decision-making strategies. We refer to this as the cyber security investment …
effective decision-making strategies. We refer to this as the cyber security investment …
[BOK][B] Security and privacy in cyber-physical systems: foundations, principles, and applications
Written by a team of experts at the forefront of the cyber-physical systems (CPS) revolution,
this book provides an in-depth look at security and privacy, two of the most critical …
this book provides an in-depth look at security and privacy, two of the most critical …
Detection against linear deception attacks on multi-sensor remote state estimation
In this paper, a security problem in cyberphysical systems (CPS) is studied. A remote state
estimation process using multiple sensors is considered. The measurement innovation …
estimation process using multiple sensors is considered. The measurement innovation …
False data injection attacks on networked control systems: A Stackelberg game analysis
In this paper, a security problem in networked control systems (NCS) is studied. In a
standard linear quadratic Gaussian (LQG) control scenario in NCS, a so-called false data …
standard linear quadratic Gaussian (LQG) control scenario in NCS, a so-called false data …