Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
stochastic games
biblio
Control Synthesis for Cyber-Physical Systems to Satisfy Metric Interval Temporal Logic Objectives under Timing and Actuator Attacks*
Submitted by aekwall on Mon, 01/25/2021 - 12:53pm
stochastic games
time-sensitive
Power capacitors
metric interval temporal logic objectives
finite state controller
durational stochastic game
control synthesis
control input
road traffic control
Clocks
actuator security
actuator attacks
CPS
actuators
timing information
timing
Temporal Logic
Games
probability
Stochastic processes
Metrics
Iterative methods
composability
pubcrawl
Human behavior
Resiliency
cyber-physical systems
biblio
A Game Theoretic Approach for Dynamic Information Flow Tracking with Conditional Branching
Submitted by aekwall on Mon, 06/08/2020 - 11:55am
Stochastic processes
linear optimization problem
Predictive Metrics
Human Factors
system security
Games
process control
computational complexity
probability
stochastic games
Analytical models
Data protection
reachability analysis
data flow analysis
pubcrawl
security
Scalability
security of data
conditional-branch tracking
polynomial-time algorithm
NetRecon attack
Linear programming
infinite-horizon undiscounted stochastic games
infinite-horizon stochastic game
DIFT
data-flow handling
control-flow commands
reachability probability
conditional branching
APT
advanced persistent threats
nonlinear programming
game theoretic security
Dynamic Information Flow Tracking
game theoretic approach
Nash Equilibrium
biblio
Security-Aware Synthesis of Human-UAV Protocols
Submitted by aekwall on Mon, 12/02/2019 - 12:05pm
security
learning (artificial intelligence)
Metrics
military aircraft
model checkers
Protocols
pubcrawl
RESCHU-SA testbed
Resiliency
human-unmanned aerial vehicle
security-aware synthesis
stealthy false-data injection attacks
stochastic game-based model
stochastic games
Stochastic processes
Task Analysis
UAV hidden-information constraint
geolocation strategies
collaboration protocols
collected experimental data
command and control systems
command injection attacks
composability
control engineering computing
formal verification
Games
autonomous aerial vehicles
geolocation task
Geology
Global Positioning System
H-UAV protocol synthesis
human operators
human-UAV coalition
human-UAV protocols
biblio
A Game-Theoretical Approach to Cyber-Security of Critical Infrastructures Based on Multi-Agent Reinforcement Learning
Submitted by grigby1 on Thu, 09/05/2019 - 11:28am
resilience
multiagent general sum game
multiagent reinforcement learning
Nash Equilibrium
optimal security configuration
optimal trade-off between prevention actions
protected CI
pubcrawl
Reinforcement learning
multi-agent systems
Resiliency
security
security of data
simulation results
stochastic games
system vulnerabilities
Vulnerability Management
zero-sum variant
critical infrastructures
attack strategy
attack-defense problem
composability
composable security
Control Strategy
Control Theory
critical infrastructure
Critical Infrastructure Protection
Aerospace electronics
cyber-physical system defense
Cyber-security
damage possible
European Project ATENA
game theory
game-theoretical approach
Games
learning (artificial intelligence)
biblio
A Stochastic Game Approach to Cyber-Physical Security with Applications to Smart Grid
Submitted by grigby1 on Fri, 02/22/2019 - 4:04pm
power system measurement
CPS
cyber layer
cyber-physical security
defending strategies
effective defense strategies
physical damage
Physical layer
physical system
Markov processes
Power system protection
stochastic game approach
stochastic games
system operator
value iteration
wide-area monitoring
zero-sum Markov game
Stochastic computing
cyber-physical systems
security of data
Games
pubcrawl
Resiliency
Scalability
Conferences
Nash Equilibrium
cyber attack
security
power engineering computing
power system security
game-theoretic approach
cyber-physical system
Smart Grids
smart power grids
Smart Grid
biblio
Foresighted Deception in Dynamic Security Games
Submitted by grigby1 on Mon, 04/02/2018 - 12:40pm
optimization
Stochastic processes
stochastic games
stochastic deception game
security protection
security of data
security
SDG
Resiliency
resilience
pubcrawl
policy-based governance
Artificial Neural Networks
myopic deception
Metrics
learning (artificial intelligence)
Iterative methods
iterative algorithm
Information systems
Heuristic algorithms
Games
dynamic security games
Data protection
biblio
Provoking the Adversary by Dual Detection Techniques: A Game Theoretical Framework
Submitted by grigby1 on Mon, 03/19/2018 - 2:00pm
jamming detection
Wireless communication
Stochastic processes
stochastic games
secret communication
Scalability
Resiliency
resilience
reliable wireless communication
Reliability
pubcrawl
physical layer security
Metrics
legitimate transmission link
Adversary Models
jamming attack
Jamming
intrusion detection system
Human behavior
Games
game theory
game theoretical framework
Eavesdropping detection
eavesdropping
dual detection techniques
computer network security
Communication system security
biblio
RRE: A Game-Theoretic Intrusion Response and Recovery Engine
Submitted by BrandonB on Tue, 05/05/2015 - 9:13am
RRE
Markov processes
network level game-theoretic response selection engine
network security property
network-level multiobjective response selection
network-level security metric values
networked computing systems
nonlinear inference
optimal network-level response actions
partially observable competitive Markov decision process
lower level attack consequences
security
Snort alerts
stochastic games
Subspace constraints
system-level security events
trees (mathematics)
two-player Stackelberg stochastic game
uncertainty
fuzzy logic theory
attack-response trees
automated response techniques
Boolean functions
Boolean logic
computer network security
Computers
decision theory
detection algorithms
Engines
ART
fuzzy rule set
fuzzy set theory
fuzzy system
game-theoretic intrusion response and recovery engine strategy
game-theoretic optimization process
Games
Intrusion Detection
Intrusion response systems