Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
game theory
biblio
Game-Theoretic Approach to Self-Regulation of Dynamic Network Infrastructure to Protect Against Cyber Attacks
Submitted by aekwall on Mon, 03/29/2021 - 11:49am
Predictive Metrics
wireless dynamic networks
self-regulation
network reconfiguration
network games
game theory approach
dynamic network infrastructure
cyber attacks protection
computer attacks
adaptive reconfiguration
game-theoretic approach
game theoretic security
Nash Equilibrium
Biological system modeling
cyberattack
Human Factors
Games
network structure
Measurement
Mathematical model
Wireless communication
pubcrawl
Resiliency
information security
game theory
Scalability
security of data
biblio
A Game Theoretic Approach For Deploying Forensic Ready Systems
Submitted by aekwall on Mon, 03/29/2021 - 11:49am
nonprovable attack scenarios
game theoretic approach
game theoretic security
game theory
Human Factors
investigation readiness
investigation-ready infrastructure
low security configurations
moderate security configurations
gained security cost
nonprovable attacks
pubcrawl
Scalability
security of data
security overhead
security solutions
two-player game
provable security
forensic-ready systems
forensic ready systems
forensic readiness
forensic experts
cyber incidents
cyber attacker
cost-prohibitive approaches
cognitive security solution
attacking defending
attack surface
Attack Strategies
adaptive cyber defender
Compositionality
Predictive Metrics
Resiliency
biblio
A Game-Theoretic Approach for Distributed Attack Mitigation in Intelligent Transportation Systems
Submitted by aekwall on Mon, 03/29/2021 - 11:49am
RSU
optimized traffic management
pollution control
Predictive Metrics
pubcrawl
Resiliency
resource allocation
road safety
road side units
maxmin game
Scalability
security game
security game model
security of data
security resource allocation
security resources
smart cities
Control Theory
ITS
Intelligent Transportation Systems
Human Factors
game-theoretic approach
game theory
game theoretic security
distributed attacks
distributed attack mitigation
decision-making abilities
data corruption attacks
connected vehicles
collision avoidance
attack mitigation
attack detection schemes
resilience
biblio
A Game-Theoretic Analysis of Cyber Attack-Mitigation in Centralized Feeder Automation System
Submitted by aekwall on Mon, 03/29/2021 - 11:48am
FA
game theoretic security
gradient methods
distribution network
attack resources
bayesian attack graph
centralized FA system
centralized feeder automation system
cyber attack-mitigation
distribution networks
Predictive Metrics
fault-tolerant location
fault-tolerant location technique
game-theoretic analysis
generalized reduced gradient algorithm
intelligent electronic devices
PSO.
security resources
three-stage game-theoretic framework
two-level zero-sum game model
Economics
Scalability
game theory
Bayes methods
Resiliency
pubcrawl
simulation
particle swarm optimisation
particle swarm optimization
cyber-attacks
security of data
automation
probability
power engineering computing
power system security
fault tolerance
Games
cyber security
Human Factors
Fault tolerant systems
file
Adversarial Thinking - Teaching Students to Think Like a Hacker.pdf
Submitted by Anonymous on Fri, 03/12/2021 - 3:53pm. Contributor:
Frank Katz
ABSTRACT
adversarial thinking
behavioral game theory
cybersecurity education
Dominant strategies
game theory
Interdependent choices
Utility preferences
Presentations
biblio
A Hybrid Game Theory and Reinforcement Learning Approach for Cyber-Physical Systems Security
Submitted by grigby1 on Tue, 02/16/2021 - 1:39pm
learning (artificial intelligence)
Virus Spreading
supervisory control and data acquisition systems
SCADA systems
Resiliency
resilience
pubcrawl
Nash Equilibrium
multiagent reinforcement learning
multi-agent systems
Multi-Agent Reinforcement Learning
malware author
Social Agents
invasive software
ICs
hybrid game theory
game theory
Damage Assessment
cyber-physical systems security
cyber-physical systems
cyber-attacks
CPS Security
CPS network
CPS
biblio
When Would You Trust a Robot? A Study on Trust and Theory of Mind in Human-Robot Interactions
Submitted by grigby1 on Wed, 02/03/2021 - 1:42pm
Humanoid robots
ToM
Theory of Mind
Robot Trust
Resiliency
resilience
pubcrawl
psychology
price game
nonhuman agent
control engineering computing
humanoid robot
human-robot interactions
human-robot interaction
Human Factors
human desire
Human behavior
HRI
game theory
biblio
Security of Networked Control Systems with Incomplete Information Based on Game Theory
Submitted by grigby1 on Wed, 02/03/2021 - 12:56pm
IDS
telecommunication control
security
Scalability
resilience
pubcrawl
Packet loss
one-shot game
networked control systems
networked control system security
NCS
Monitoring
intrusion detection system
Industrial Control Systems
incomplete information based on game theory
Incomplete information
Networked Control Systems Security
Games
game theory
energy consumption
DoS attacks
Denial of Service attacks
cyber-physical systems
Control Theory
computer network security
belief networks
Bayes rule
Bayes methods
Predictive Metrics
composability
Resiliency
biblio
Exploiting an Adversary’s Intentions in Graphical Coordination Games
Submitted by grigby1 on Thu, 01/28/2021 - 1:12pm
optimal system design
unknown adversary
Topology
System performance
system operator
security strategy
security of data
security
Scalability
Resiliency
resilience
pubcrawl
Planning
adversarial behavior
network topology
multi-agent systems
Metrics
Human behavior
graphical coordination games
graph theory
Games
game theory
fine-grained information
adversary type
Adversary Models
adversarial intent
biblio
Quickest Detection of Advanced Persistent Threats: A Semi-Markov Game Approach
Submitted by grigby1 on Fri, 01/22/2021 - 1:38pm
cyberattack
two-time scale Q-learning algorithm
Stackelberg zero-sum semi-Markov games
Stackelberg semiMarkov game
refinable attack investigation framework
real-word attack dataset
Rain
multistage attacks
Limiting average reward criteria
DIFT-based defender
Dynamic Information Flow Tracking
advanced persistent threats
q-learning
Markov processes
game theory
security of data
threat detection
APT
advanced persistent threat
Cyber Attacks
Games
Security analysis
Computational modeling
Scalability
Analytical models
Resiliency
resilience
Metrics
Human behavior
pubcrawl
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »