Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
game theoretic approach
biblio
A Game Theoretic Approach For Deploying Forensic Ready Systems
Submitted by aekwall on Mon, 03/29/2021 - 10:49am
nonprovable attack scenarios
game theoretic approach
game theoretic security
game theory
Human Factors
investigation readiness
investigation-ready infrastructure
low security configurations
moderate security configurations
gained security cost
nonprovable attacks
pubcrawl
Scalability
security of data
security overhead
security solutions
two-player game
provable security
forensic-ready systems
forensic ready systems
forensic readiness
forensic experts
cyber incidents
cyber attacker
cost-prohibitive approaches
cognitive security solution
attacking defending
attack surface
Attack Strategies
adaptive cyber defender
Compositionality
Predictive Metrics
Resiliency
biblio
A Game Theoretic Approach for Dynamic Information Flow Tracking with Conditional Branching
Submitted by aekwall on Mon, 06/08/2020 - 10:55am
Stochastic processes
linear optimization problem
Predictive Metrics
Human Factors
system security
Games
process control
computational complexity
probability
stochastic games
Analytical models
Data protection
reachability analysis
data flow analysis
pubcrawl
security
Scalability
security of data
conditional-branch tracking
polynomial-time algorithm
NetRecon attack
Linear programming
infinite-horizon undiscounted stochastic games
infinite-horizon stochastic game
DIFT
data-flow handling
control-flow commands
reachability probability
conditional branching
APT
advanced persistent threats
nonlinear programming
game theoretic security
Dynamic Information Flow Tracking
game theoretic approach
Nash Equilibrium
biblio
A Strategic Analysis of Attacker-Defender Repeated Game in Smart Grid Security
Submitted by aekwall on Mon, 02/17/2020 - 1:16pm
Repeated game
optimal strategic behavior
power engineering computing
power grid security schemes
power system
power system security
power transmission lines
Predictive Metrics
privacy
pubcrawl
Monitoring tools
Resiliency
Scalability
security
security of data
smart grid security
Smart Grids
smart power grid
smart power grids
strategic analysis
game theoretic approach
attack-defense budget
attacker-defender game
attacker-defender interaction
attacker-defender repeated game
attacker-defender strategic interaction
cyber control
Cyber-physical attacks
cyber-physical systems
game payoffs calculation
and budget limitation
game theory
Games
generation power
game theoretic security
Human Factors
IEEE 39 bus benchmark system
Mathematical model
Metrics
Monitoring
biblio
Game theoretic approach towards intrusion detection
Submitted by aekwall on Mon, 12/30/2019 - 11:25am
Games
game theoretic security
probe attacks
NSLKDD dataset
game model
dominated strategies elimination method
Dominated Strategies
game theoretic approach
Predictive Metrics
Human Factors
Probes
Intrusion Detection
wireless sensor networks
pubcrawl
network security
data traffic
game theory
Protocols
Scalability
intrusion detection system
security of data
biblio
The positive force of deterrence: Estimating the quantitative effects of target shifting
Submitted by aekwall on Wed, 12/18/2019 - 1:37pm
counter piracy
Terrorism
target shifting
stopping performance
Radiation detectors
low performance security
game theoretic approach
force multiplier
Force measurement
false alarm
deterrence force
counterterrorism
security of data
Deterrence
risk analysis
protection system
resilience
uncertainty
Force
pubcrawl
Human behavior
game theory
Scalability