Game theory for cyber security and privacy
In this survey, we review the existing game-theoretic approaches for cyber security and
privacy issues, categorizing their application into two classes, security and privacy. To show …
privacy issues, categorizing their application into two classes, security and privacy. To show …
State of the art of cyber-physical systems security: An automatic control perspective
Cyber-physical systems are integrations of computation, networking, and physical
processes. Due to the tight cyber-physical coupling and to the potentially disrupting …
processes. Due to the tight cyber-physical coupling and to the potentially disrupting …
Temporal logics for learning and detection of anomalous behavior
The increased complexity of modern systems necessitates automated anomaly detection
methods to detect possible anomalous behavior determined by malfunctions or external …
methods to detect possible anomalous behavior determined by malfunctions or external …
Cross-layer codesign for secure cyber-physical systems
Security attacks may have disruptive consequences on cyber-physical systems, and lead to
significant social and economic losses. Building secure cyber-physical systems is …
significant social and economic losses. Building secure cyber-physical systems is …
Cyber-physical systems security: a systematic map** study
Cyber-physical systems are integrations of computation, networking, and physical
processes. Due to the tight cyber-physical coupling and to the potentially disrupting …
processes. Due to the tight cyber-physical coupling and to the potentially disrupting …
Dynamic games with asymmetric information and resource constrained players with applications to security of cyberphysical systems
We model attacks on a cyberphysical system as a game between two players-the attacker
and the system. The players may not acquire the complete information about each other …
and the system. The players may not acquire the complete information about each other …
Secure control design for cooperative adaptive cruise control under false data injection attack
Cooperative adaptive cruise control (CACC) is one of the many advanced driver assistance
systems (ADAS) that leverage communication between nearby vehicles to maintain speed …
systems (ADAS) that leverage communication between nearby vehicles to maintain speed …
RETRACTED: Prevailing and emerging cyber threats and security practices in IoT-Enabled smart grids: A survey
A Gupta, A Anpalagan, GHS Carvalho, AS Khwaja… - 2019 - Elsevier
Three missing references should have been added throughout the manuscript [145] S. Yasir;
C. Noel; RM Husain, C. Rebecca,“Open Access Internet of Things-aided Smart Grid …
C. Noel; RM Husain, C. Rebecca,“Open Access Internet of Things-aided Smart Grid …
Approximate information states for worst-case control and learning in uncertain systems
In this article, we investigate discrete-time decision-making problems in uncertain systems
with partially observed states. We consider a nonstochastic model, where uncontrolled …
with partially observed states. We consider a nonstochastic model, where uncontrolled …
Worst-case control and learning using partial observations over an infinite time horizon
Safety-critical cyber-physical systems require control strategies whose worst-case
performance is robust against adversarial disturbances and modeling uncertainties. In this …
performance is robust against adversarial disturbances and modeling uncertainties. In this …