Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Nash Equilibrium
biblio
A Game Theoretic Approach for Dynamic Information Flow Tracking with Conditional Branching
Submitted by aekwall on Mon, 06/08/2020 - 11:55am
Stochastic processes
linear optimization problem
Predictive Metrics
Human Factors
system security
Games
process control
computational complexity
probability
stochastic games
Analytical models
Data protection
reachability analysis
data flow analysis
pubcrawl
security
Scalability
security of data
conditional-branch tracking
polynomial-time algorithm
NetRecon attack
Linear programming
infinite-horizon undiscounted stochastic games
infinite-horizon stochastic game
DIFT
data-flow handling
control-flow commands
reachability probability
conditional branching
APT
advanced persistent threats
nonlinear programming
game theoretic security
Dynamic Information Flow Tracking
game theoretic approach
Nash Equilibrium
biblio
Effects of Interdependencies on Game-Theoretic Defense of Cyber-Physical Infrastructures
Submitted by aekwall on Mon, 06/08/2020 - 11:25am
Infrastructure security
star topology
simultaneous game
Servers
security of data
security
Scalability
resource allocation
pubcrawl
Predictive Metrics
optical switches
Numerical models
Nash Equilibrium
interdependency levels
Interdependencies
Integrated optics
Attack Strategies
infrastructure resilience
infrastructure design
Human Factors
Games
game-theoretic defense strategy
game theory
game theoretic security
external attacks
defense effort
cyber-physical infrastructures
Cost accounting
constituent systems
bus structure
basic topological structures
biblio
A Game-theoretic Framework for Security-aware Sensor Placement Problem in Networked Control Systems
Submitted by aekwall on Mon, 06/08/2020 - 11:22am
game theoretic security
zero-sum game
undirected tree
undirected topology
system L2 gain
Stackelberg equilibrium
security-aware sensor placement problem
optimal sensor placement strategy
Networked Control System
game-theoretic framework
game leader
detector decision
attacker-detector game
attacker decision
attack signals
Symmetric matrices
security of data
Nash Equilibrium
Cyber-physical attacks
networked control systems
Predictive Metrics
Human Factors
Games
optimisation
trees (mathematics)
sensor placement
pubcrawl
game theory
security
Scalability
Monitoring
Detectors
biblio
Game theoretic framework for cyber-physical system security incorporating bounded rationality
Submitted by aekwall on Mon, 06/08/2020 - 11:22am
limited computational capacity
theoretically expected outcome
security of data
security
Scalability
rational game playing
rational decision making
pursuit maximum payoff
pubcrawl
Predictive Metrics
Nash Equilibrium
minimax techniques
minimax Nash Equilibrium strategy
behavioural analysis
Industries
Human Factors
Games
game theory
game theoretic security
game theoretic attack-defence decision
defender
decision making process
Decision Making
cyber-physical systems
cyber-physical system security
Bounded Rationality
biblio
Consideration of security for PLNC with untrusted relay in game theoretic perspective
Submitted by aekwall on Mon, 12/30/2019 - 12:26pm
power control
Nash Equilibrium
game theoretic perspective
informed CSI
interfered signal
optimal control
physical layer network coding
physical layer security
PLNC
telecommunication control
received signal
relay station
secure wireless communication link
transmit power control
Transmit Power Control Channel State Information
untrusted relay
game theoretic security
Scalability
channel state information
relay networks (telecommunication)
network coding
Predictive Metrics
Human Factors
Games
Relays
radio networks
Physical layer
optimisation
optimization
Wireless communication
pubcrawl
game theory
telecommunication security
biblio
Fault Tolerance and Security in Forwarding Packets Using Game Theory
Submitted by aekwall on Mon, 12/30/2019 - 12:25pm
price of anarchy
wireless sensor networks
wireless networks
wireless mesh networks
Waste materials
telecommunication security
telecommunication network reliability
self organized wireless network
security
Scalability
Relays
radio networks
pubcrawl
Ad hoc networks
Predictive Metrics
Nash Equilibrium
Mesh networks
Human Factors
game theory
game theoretic security
forwarding packet security
forwarding packet fault tolerance
fault tolerance
cooperation strategy
cooperation stimulation
biblio
Trust Evaluation for Light Weight Security in Sensor Enabled Internet of Things: Game Theory Oriented Approach
Submitted by aekwall on Mon, 12/09/2019 - 12:24pm
illegitimate sensor nodes
cluster head
cluster member
clustered-sensor enabled IoT
control packets
EETE scheme
Energy
Energy Efficiency
energy efficient trust evaluation scheme
game theory oriented approach
hierarchical trust evaluation model
cluster formation game
light weight security
malicious activity
Nash Equilibrium
network wide dissemination
optimal cluster formation dilemma game
sensor enabled Internet of Things
sensor networks
trust recommendations
trust requests
Computing Theory and Trust
Computational modeling
Internet of Things
telecommunication security
Internet of Things (IoT)
Trusted Computing
game theory
pubcrawl
composability
wireless sensor networks
energy conservation
Cryptography
security
clustering
trust
network lifetime
Games
energy consumption
Compositionality
anomaly detection technique
activity-based trust dilemma game
CH
biblio
A Game-Theoretical Approach to Cyber-Security of Critical Infrastructures Based on Multi-Agent Reinforcement Learning
Submitted by grigby1 on Thu, 09/05/2019 - 11:28am
resilience
multiagent general sum game
multiagent reinforcement learning
Nash Equilibrium
optimal security configuration
optimal trade-off between prevention actions
protected CI
pubcrawl
Reinforcement learning
multi-agent systems
Resiliency
security
security of data
simulation results
stochastic games
system vulnerabilities
Vulnerability Management
zero-sum variant
critical infrastructures
attack strategy
attack-defense problem
composability
composable security
Control Strategy
Control Theory
critical infrastructure
Critical Infrastructure Protection
Aerospace electronics
cyber-physical system defense
Cyber-security
damage possible
European Project ATENA
game theory
game-theoretical approach
Games
learning (artificial intelligence)
biblio
A Stochastic Game Approach to Cyber-Physical Security with Applications to Smart Grid
Submitted by grigby1 on Fri, 02/22/2019 - 4:04pm
power system measurement
CPS
cyber layer
cyber-physical security
defending strategies
effective defense strategies
physical damage
Physical layer
physical system
Markov processes
Power system protection
stochastic game approach
stochastic games
system operator
value iteration
wide-area monitoring
zero-sum Markov game
Stochastic computing
cyber-physical systems
security of data
Games
pubcrawl
Resiliency
Scalability
Conferences
Nash Equilibrium
cyber attack
security
power engineering computing
power system security
game-theoretic approach
cyber-physical system
Smart Grids
smart power grids
Smart Grid
biblio
Heterogeneous Multi-Layer Adversarial Network Design for the IoT-Enabled Infrastructures
Submitted by grigby1 on Mon, 12/10/2018 - 11:34am
IoT-enabled infrastructures
Wireless communication
underlaid device network
three-player three-stage game theoretic framework
subgame perfect Nash equilibrium
smart everything initiatives
Scalability
Resiliency
resilience
pubcrawl
overlaid device network
optimisation
network connectivity
Nash Equilibrium
multilayer system architecture
Algorithm design and analysis
iobt
Internet of Things
Internet of battlefield things
internet
infrastructure network operators
Human Factors
heterogeneous multilayer adversarial network design
Games
game theory
Electronic mail
computer network security
Communication system security
coexisting infrastructure network
Big Data
« first
‹ previous
1
2
3
4
5
next ›
last »