Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
game theoretic security
biblio
A Game Theoretic Analysis on Block Withholding Attacks Using the Zero-Determinant Strategy
Submitted by aekwall on Mon, 06/08/2020 - 11:25am
Predictive Metrics
Zero-Determinant strategy
ZD player
ZD adopter
open mining pools
mutual attacks
macroscopic utility
game theoretic analysis
conventional game theory
block withholding attacks
block withholding attack
Bitcoin's incentive system
game theoretic security
security of data
Human Factors
Games
security threats
delays
distributed system
Data mining
blockchain
bitcoin
pubcrawl
game theory
Scalability
biblio
Game-Theoretic Planning to Counter DDoS in NEMESIS
Submitted by aekwall on Mon, 06/08/2020 - 11:24am
Human Factors
security and privacy
packet-level simulation
network maneuvers
NEMESIS
game-theoretic planning
game theoretic optimal courses of action
distributed denial-of-service attacks
COA
analytical wargaming
game theoretic security
Predictive Metrics
Computer crime
Games
Mathematical model
Planning
Analytical models
pubcrawl
game theory
Servers
Scalability
distributed denial of service attacks
DDoS
computer network security
biblio
Game-Based Attack Defense Model to Provide Security for Relay Selection in 5G Mobile Networks
Submitted by aekwall on Mon, 06/08/2020 - 11:24am
scalable connectivity
networking capabilities
noncooperative game
Predictive Metrics
protected relay
protection level
pubcrawl
relay networks (telecommunication)
relay nodes
relay selection
Scalability
Nash equilibrium convergence analysis
security
source device
source node
spectral efficiency
system capacity
telecommunication security
telecommunication traffic
ubiquitous connectivity
universal communication environment
utility function
equilibrium state
composability
Resiliency
5G mobile communication
5G mobile networks
5G networks
attack-defense
cooperative D-to-D communication
data packet transmission
Device-to-device communication
dynamic game theoretic based approach
Dynamic Networks and Security
extensive signal coverage
game theoretic security
game theory
game-based attack defense model
heterogeneous devices
heuristic algorithm
Human Factors
large-scale mobile networks
link reliability
multiple communication technologies
biblio
A Game-theoretic Framework for Security-aware Sensor Placement Problem in Networked Control Systems
Submitted by aekwall on Mon, 06/08/2020 - 11:22am
game theoretic security
zero-sum game
undirected tree
undirected topology
system L2 gain
Stackelberg equilibrium
security-aware sensor placement problem
optimal sensor placement strategy
Networked Control System
game-theoretic framework
game leader
detector decision
attacker-detector game
attacker decision
attack signals
Symmetric matrices
security of data
Nash Equilibrium
Cyber-physical attacks
networked control systems
Predictive Metrics
Human Factors
Games
optimisation
trees (mathematics)
sensor placement
pubcrawl
game theory
security
Scalability
Monitoring
Detectors
biblio
Game theoretic framework for cyber-physical system security incorporating bounded rationality
Submitted by aekwall on Mon, 06/08/2020 - 11:22am
limited computational capacity
theoretically expected outcome
security of data
security
Scalability
rational game playing
rational decision making
pursuit maximum payoff
pubcrawl
Predictive Metrics
Nash Equilibrium
minimax techniques
minimax Nash Equilibrium strategy
behavioural analysis
Industries
Human Factors
Games
game theory
game theoretic security
game theoretic attack-defence decision
defender
decision making process
Decision Making
cyber-physical systems
cyber-physical system security
Bounded Rationality
biblio
DSOR: A Traffic-Differentiated Secure Opportunistic Routing with Game Theoretic Approach in MANETs
Submitted by grigby1 on Wed, 02/26/2020 - 4:35pm
Compositionality
Computer Theory and Trust
composability
game theoretic security
Human Factors
MANETs
Predictive Metrics
pubcrawl
Scalability
secure opportunistic routing
traffic-differentiated
trust
Trust Routing
biblio
A Strategic Analysis of Attacker-Defender Repeated Game in Smart Grid Security
Submitted by aekwall on Mon, 02/17/2020 - 2:16pm
Repeated game
optimal strategic behavior
power engineering computing
power grid security schemes
power system
power system security
power transmission lines
Predictive Metrics
privacy
pubcrawl
Monitoring tools
Resiliency
Scalability
security
security of data
smart grid security
Smart Grids
smart power grid
smart power grids
strategic analysis
game theoretic approach
attack-defense budget
attacker-defender game
attacker-defender interaction
attacker-defender repeated game
attacker-defender strategic interaction
cyber control
Cyber-physical attacks
cyber-physical systems
game payoffs calculation
and budget limitation
game theory
Games
generation power
game theoretic security
Human Factors
IEEE 39 bus benchmark system
Mathematical model
Metrics
Monitoring
biblio
Consideration of security for PLNC with untrusted relay in game theoretic perspective
Submitted by aekwall on Mon, 12/30/2019 - 12:26pm
power control
Nash Equilibrium
game theoretic perspective
informed CSI
interfered signal
optimal control
physical layer network coding
physical layer security
PLNC
telecommunication control
received signal
relay station
secure wireless communication link
transmit power control
Transmit Power Control Channel State Information
untrusted relay
game theoretic security
Scalability
channel state information
relay networks (telecommunication)
network coding
Predictive Metrics
Human Factors
Games
Relays
radio networks
Physical layer
optimisation
optimization
Wireless communication
pubcrawl
game theory
telecommunication security
biblio
Game theoretic approach towards intrusion detection
Submitted by aekwall on Mon, 12/30/2019 - 12:25pm
Games
game theoretic security
probe attacks
NSLKDD dataset
game model
dominated strategies elimination method
Dominated Strategies
game theoretic approach
Predictive Metrics
Human Factors
Probes
Intrusion Detection
wireless sensor networks
pubcrawl
network security
data traffic
game theory
Protocols
Scalability
intrusion detection system
security of data
biblio
Fault Tolerance and Security in Forwarding Packets Using Game Theory
Submitted by aekwall on Mon, 12/30/2019 - 12:25pm
price of anarchy
wireless sensor networks
wireless networks
wireless mesh networks
Waste materials
telecommunication security
telecommunication network reliability
self organized wireless network
security
Scalability
Relays
radio networks
pubcrawl
Ad hoc networks
Predictive Metrics
Nash Equilibrium
Mesh networks
Human Factors
game theory
game theoretic security
forwarding packet security
forwarding packet fault tolerance
fault tolerance
cooperation strategy
cooperation stimulation
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »