Game theory for cyber security and privacy

CT Do, NH Tran, C Hong, CA Kamhoua… - ACM Computing …, 2017 - dl.acm.org
In this survey, we review the existing game-theoretic approaches for cyber security and
privacy issues, categorizing their application into two classes, security and privacy. To show …

State of the art of cyber-physical systems security: An automatic control perspective

YZ Lun, A D'Innocenzo, F Smarra, I Malavolta… - Journal of Systems and …, 2019 - Elsevier
Cyber-physical systems are integrations of computation, networking, and physical
processes. Due to the tight cyber-physical coupling and to the potentially disrupting …

Temporal logics for learning and detection of anomalous behavior

Z Kong, A Jones, C Belta - IEEE Transactions on Automatic …, 2016 - ieeexplore.ieee.org
The increased complexity of modern systems necessitates automated anomaly detection
methods to detect possible anomalous behavior determined by malfunctions or external …

Cross-layer codesign for secure cyber-physical systems

B Zheng, P Deng, R Anguluri, Q Zhu… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
Security attacks may have disruptive consequences on cyber-physical systems, and lead to
significant social and economic losses. Building secure cyber-physical systems is …

Cyber-physical systems security: a systematic map** study

YZ Lun, A D'Innocenzo, I Malavolta… - arxiv preprint arxiv …, 2016 - arxiv.org
Cyber-physical systems are integrations of computation, networking, and physical
processes. Due to the tight cyber-physical coupling and to the potentially disrupting …

Dynamic games with asymmetric information and resource constrained players with applications to security of cyberphysical systems

A Gupta, C Langbort, T Başar - IEEE Transactions on Control of …, 2016 - ieeexplore.ieee.org
We model attacks on a cyberphysical system as a game between two players-the attacker
and the system. The players may not acquire the complete information about each other …

Secure control design for cooperative adaptive cruise control under false data injection attack

P Ansari-Bonab, JC Holland… - IEEE Transactions …, 2024 - ieeexplore.ieee.org
Cooperative adaptive cruise control (CACC) is one of the many advanced driver assistance
systems (ADAS) that leverage communication between nearby vehicles to maintain speed …

RETRACTED: Prevailing and emerging cyber threats and security practices in IoT-Enabled smart grids: A survey

A Gupta, A Anpalagan, GHS Carvalho, AS Khwaja… - 2019 - Elsevier
Three missing references should have been added throughout the manuscript [145] S. Yasir;
C. Noel; RM Husain, C. Rebecca,“Open Access Internet of Things-aided Smart Grid …

Approximate information states for worst-case control and learning in uncertain systems

A Dave, N Venkatesh… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
In this article, we investigate discrete-time decision-making problems in uncertain systems
with partially observed states. We consider a nonstochastic model, where uncontrolled …

Worst-case control and learning using partial observations over an infinite time horizon

A Dave, I Faros, N Venkatesh… - 2023 62nd IEEE …, 2023 - ieeexplore.ieee.org
Safety-critical cyber-physical systems require control strategies whose worst-case
performance is robust against adversarial disturbances and modeling uncertainties. In this …