A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Game-theoretic resilience analysis of Cyber-Physical Systems
2013
2013 IEEE 1st International Conference on Cyber-Physical Systems, Networks, and Applications (CPSNA)
We investigate the resilience of cyber physical systems by modeling the interaction between provider and attacker as a simultaneous game that incorporates cyber and physical spaces. ...
The system resilience function is formulated as a power-form product of the survival probabilities of cyber and physical spaces, each with a corresponding correlation coefficient. ...
in the unit cyber defense cost, the inherent cyber defense level, the physical correlation coefficient, and the physical attack. 2) Discrete Case: Considering the defense and attack efforts as the number ...
doi:10.1109/cpsna.2013.6614252
dblp:conf/cpsna/He0RMY13
fatcat:dvpctdn3fnel3pnvcywzvcbkme
Preface to the Focused Issue on Dynamic Games in Cyber Security
2019
Dynamic Games and Applications
This issue features five papers on game-theoretic models and analysis approaches for cyber and cyber-physical security of networked systems. ...
In their discussion of these topics, the authors include references to recent advancements and discuss key issues in the analysis of dynamic games for security problems. ...
The fourth paper "Supervisory Control of Discrete-event Systems under Attacks," by Wakaiki, Tabuada, and Hespanha, is motivated by issues in computer security where the cyber defense system must make decisions ...
doi:10.1007/s13235-019-00335-x
fatcat:vy3uplj7aze5pjp6oiz5snnuyy
Concept and Research Framework for Coordinated Situation Awareness and Active Defense of Cyber-physical Power Systems Against Cyber-attacks
2021
Journal of Modern Power Systems and Clean Energy
Index Terms--Cyber-physical power system (CPPS), cyber security, cyber-attack, situation awareness, active defense. I. ...
finally result in system instability, uneconomic operation and other issues in physical power systems [4] . ...
This serves as the theoretical basis of the cyber-physical coordinated defense system. ...
doi:10.35833/mpce.2018.000830
fatcat:2ahdvcutkvhhli6vldv22hm37m
Cyber–Physical Correlation Effects in Defense Games for Large Discrete Infrastructures
2018
Games
For large discrete infrastructures characterized by the number of cyber and physical components, we characterize the cyber–physical interactions at two levels: (i) the cyber–physical failure correlation ...
We formulate an abstract problem of ensuring the survival probability of a cyber–physical infrastructure with discrete components as a game between the provider and attacker, whose utility functions are ...
Conflicts of Interest: The authors declare no conflict of interest. ...
doi:10.3390/g9030052
fatcat:zwzojprwqvgvhc5emtwwf7pubq
Defense of Cyber Infrastructures Against Cyber-Physical Attacks Using Game-Theoretic Models
2015
Risk Analysis
Within the context of network and computing infrastructures, we study the strategic interactions between an attacker and a defender using game-theoretic models that take into account both cyber and physical ...
The operation of cyber infrastructures relies on both cyber and physical components, which are subject to incidental and intentional degradations of different kinds. ...
GAME-THEORETIC ANALYSIS In this section, we first consider the Boolean attack-defense model for cyber and physical subinfrastructures or parts, followed by the discrete case where each part consists of ...
doi:10.1111/risa.12362
pmid:25847370
fatcat:vjgwe5oeazcepmu7dfbh3z26fe
Defense Strategies for Asymmetric Networked Systems with Discrete Components
2018
Sensors
We apply these results to derive and analyze defense strategies for distributed cloud computing infrastructures using cyber-physical models. ...
We consider infrastructures consisting of a network of systems, each composed of discrete components. ...
Conflicts of Interest: The authors declare no conflict of interest. ...
doi:10.3390/s18051421
pmid:29751588
pmcid:PMC5982420
fatcat:eq7d5juhjze23l2dyhxi3gfkj4
A review of game theory approach to cyber security risk management
2018
Nigerian Journal of Technology
This paper presents a review of game theoretic-based model for cyber security risk management. ...
Specifically, issues on modeling, some related works and significance of game theoretic approach to cyber security risk management are presented. ...
The authors in [55] , presented a game-theoretic analysis of attack and defense in cyber-physical network infrastructures. ...
doi:10.4314/njt.v36i4.38
fatcat:wcrm6bkcmzajbnkdibd7bwsr6q
In quest of benchmarking security risks to cyber-physical systems
2013
IEEE Network
Such cyber-physical systems (CPSs) permit synergistic interactions between physical dynamics and computational processes. ...
These infrastructures are spatially distributed across large physical areas, and consist of heterogeneous cyber-physical components interconnected by communication networks with complex peering and hierarchies ...
Our game-theoretic approach to estimating security risks facilitates more effective defenses, especially against correlated failures. ...
doi:10.1109/mnet.2013.6423187
fatcat:ecu3kwviorgitfudez5la7gcca
Dynamic Games for Secure and Resilient Control System Design
[article]
2019
arXiv
pre-print
cyber-physical-human control systems. ...
Modern control systems are featured by their hierarchical structure composing of cyber, physical, and human layers. ...
Analysis of large-scale game-theoretic models is often difficult. ...
arXiv:1910.07510v3
fatcat:4rxeyse6dnbspop7hxalhzcedq
A survey on the security of cyber-physical systems
2016
Control Theory and Technology
Cyber-physical systems (CPSs) are integrations of computation, communication, control and physical processes. ...
Security is one of the most important issues that should be investigated in CPSs and hence has received much attention in recent years. ...
Introduction Cyber-physical systems can be generally characterized as complex networked control systems, which combine physical elements in the real world with computing elements in the cyber space. ...
doi:10.1007/s11768-016-5123-9
fatcat:bcdtusqftvgslffnkp57h33oz4
Deep Reinforcement Learning for Cyber Security
[article]
2020
arXiv
pre-print
We touch on different vital aspects, including DRL-based security methods for cyber-physical systems, autonomous intrusion detection techniques, and multi-agent DRL-based game theory simulations for defense ...
The scale of Internet-connected systems has increased considerably, and these systems are being exposed to cyber attacks more than ever. ...
[81] proposed the use of DRL, i.e., double Fig. 5 . The dynamics of attack and defense in a cyber-physical system. ...
arXiv:1906.05799v3
fatcat:h4lujrwb5bgwngbi4xf6w347b4
A Moving-Horizon Hybrid Stochastic Game for Secure Control of Cyber-Physical Systems
[article]
2017
arXiv
pre-print
In this paper, we establish a zero-sum, hybrid state stochastic game model for designing defense policies for cyber-physical systems against different types of attacks. ...
The hybrid game model we propose in this work contains physical states that are described by the system dynamics, and a cyber state that represents the detection mode of the system composed by a set of ...
The hybrid state of the game model contains a dynamic system state that captures the evolution of the physical processes, and discrete cyber modes that represent different security states of the CPS according ...
arXiv:1710.00288v1
fatcat:u42rwcal6jb3jjuj3hb3nbeghm
Methodical and Applied Aspects of Creation and Application of Cyber Ranges
2019
Theoretical and Applied Cybersecurity
These cyber ranges can be used for: research issues of cyber monitoring, cyber defense and cyber influence; design of fundamental and applied bases of constructing mathematical support of software and ...
threats in cyber space. ...
of system analysis theory. ...
doi:10.20535/tacs.2664-29132019.1.169089
fatcat:3jxys65vmfdixbtisalywbwqki
Cyber-Physical Power System (CPPS): A Review on Modelling, Simulation, and Analysis with Cyber Security Applications
2020
IEEE Access
(ii) GAME-THEORETIC MODEL In recent years the cyberattacks on the physical power system are increasing the attention worldwide. ...
The attack detection and mitigation game-theoretical model is used to model the cyber-physical interaction process and also applied for risk, vulnerability, and threat analysis. ...
doi:10.1109/access.2020.3016826
fatcat:caax2ubyyrclhj37g5ynvlm66q
Simulation for cybersecurity: state of the art and future directions
2021
Journal of Cybersecurity
; risk analysis and assessment; and humans in cybersecurity research. ...
The proposed way forward section posits that the advancement of collecting and accessing sociotechnological data to inform models, the creation of new theoretical constructs, and the integration and improvement ...
Conflict of interest statement. Authors declare no conflict of interest. ...
doi:10.1093/cybsec/tyab005
fatcat:nx72szjmi5bxzdiixmvxa6e6ey
« Previous
Showing results 1 — 15 out of 1,270 results