Filters








1,321 Hits in 6.4 sec

Preface to the Focused Issue on Dynamic Games in Cyber Security

Saurabh Amin, Karl Henrik Johansson
<span title="2019-11-01">2019</span> <i title="Springer Science and Business Media LLC"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/6tjsn4snxrctnhuj3ag5azqkvi" style="color: black;">Dynamic Games and Applications</a> </i> &nbsp;
This issue features five papers on game-theoretic models and analysis approaches for cyber and cyber-physical security of networked systems.  ...  The authors focus on cyber-physical security (as opposed to just cyber security) problems where dynamic interaction between the main players (i.e., attackers and defenders) is a key feature.  ...  We hope that the five papers presented in this focused issue will lead to more interest in dynamic games for cyber and cyber-physical security applications.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/s13235-019-00335-x">doi:10.1007/s13235-019-00335-x</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/vy3uplj7aze5pjp6oiz5snnuyy">fatcat:vy3uplj7aze5pjp6oiz5snnuyy</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200305062430/https://link.springer.com/content/pdf/10.1007%2Fs13235-019-00335-x.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/21/13/2113cb1c8f6ee526475e8ff2b05ecead6d302dcb.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/s13235-019-00335-x"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Game-theoretic resilience analysis of Cyber-Physical Systems

Fei He, Jun Zhuang, Nageswara S. V. Rao, Chris Y. T. Ma, David K. Y. Yau
<span title="">2013</span> <i title="IEEE"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/tw6bckyjmrhsjj2ya3glampz7u" style="color: black;">2013 IEEE 1st International Conference on Cyber-Physical Systems, Networks, and Applications (CPSNA)</a> </i> &nbsp;
We investigate the resilience of cyber physical systems by modeling the interaction between provider and attacker as a simultaneous game that incorporates cyber and physical spaces.  ...  We present the provider strategies based on the Nash equilibrium of the game, and analyze the sensitivities with respect to cyber and physical correlation coefficients, target revenues and costs.  ...  For example, consider the effects of c Ac on x c * .  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/cpsna.2013.6614252">doi:10.1109/cpsna.2013.6614252</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/cpsna/He0RMY13.html">dblp:conf/cpsna/He0RMY13</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/dvpctdn3fnel3pnvcywzvcbkme">fatcat:dvpctdn3fnel3pnvcywzvcbkme</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170808140324/http://www.eng.buffalo.edu/~jzhuang/Papers/He_etal_CPSNA_2013.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/5a/c0/5ac0bb9a75dfd44662dcffb3209595eeae4a564a.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/cpsna.2013.6614252"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

In quest of benchmarking security risks to cyber-physical systems

S. Amin, G. A. Schwartz, A. Hussain
<span title="">2013</span> <i title="Institute of Electrical and Electronics Engineers (IEEE)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/dj5kgyxcuzdmhaxvx5dcvfmvce" style="color: black;">IEEE Network</a> </i> &nbsp;
These infrastructures are spatially distributed across large physical areas, and consist of heterogeneous cyber-physical components interconnected by communication networks with complex peering and hierarchies  ...  urvivability of critical infrastructures in the presence of security attacks and random faults is of national importance.  ...  Our game-theoretic approach to estimating security risks facilitates more effective defenses, especially against correlated failures.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/mnet.2013.6423187">doi:10.1109/mnet.2013.6423187</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/ecu3kwviorgitfudez5la7gcca">fatcat:ecu3kwviorgitfudez5la7gcca</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170808233844/http://robotics.eecs.berkeley.edu/~sastry/pubs/Pdfs%20of%202013/AminInQuestof2013.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/e4/49/e449c26e6ecebcfe9167e3d8b9c365dcbba9e4e2.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/mnet.2013.6423187"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

Dynamic Games for Secure and Resilient Control System Design [article]

Yunhan Huang, Juntao Chen, Linan Huang, Quanyan Zhu
<span title="2019-10-19">2019</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
cyber-physical-human control systems.  ...  Modern control systems are featured by their hierarchical structure composing of cyber, physical, and human layers.  ...  For game-theoretic security surveys in general Cyber-Physical Systems (CPSs), one can refer to [14] - [18] . A.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1910.07510v3">arXiv:1910.07510v3</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/4rxeyse6dnbspop7hxalhzcedq">fatcat:4rxeyse6dnbspop7hxalhzcedq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200904183348/https://arxiv.org/pdf/1910.07510v3.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/eb/0f/eb0f4bdb245c4532e69458c2e703bffa0de03f3c.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1910.07510v3" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

Cyber-physical security of Wide-Area Monitoring, Protection and Control in a smart grid environment

Aditya Ashok, Adam Hahn, Manimaran Govindarasu
<span title="">2014</span> <i title="Elsevier BV"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/nn7wkdg6krfshoinehn4d7nrfi" style="color: black;">Journal of Advanced Research</a> </i> &nbsp;
Finally, the paper briefly describes how cyber-physical testbeds can be used to evaluate the security research and perform realistic attack-defense studies for smart grid type environments.  ...  ª 2014 Production and hosting by Elsevier B.V. on behalf of Cairo University.  ...  Saurabh Amin for providing us insights on game theoretic concepts and formulations.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1016/j.jare.2013.12.005">doi:10.1016/j.jare.2013.12.005</a> <a target="_blank" rel="external noopener" href="https://www.ncbi.nlm.nih.gov/pubmed/25685516">pmid:25685516</a> <a target="_blank" rel="external noopener" href="https://pubmed.ncbi.nlm.nih.gov/PMC4294746/">pmcid:PMC4294746</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/a4n2tojt55gsxmixxsq3m4aafu">fatcat:a4n2tojt55gsxmixxsq3m4aafu</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170928121059/http://publisher-connector.core.ac.uk/resourcesync/data/elsevier/pdf/65b/aHR0cDovL2FwaS5lbHNldmllci5jb20vY29udGVudC9hcnRpY2xlL3BpaS9zMjA5MDEyMzIxMzAwMTQ5NQ%3D%3D.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/b7/f3/b7f3c18429e58eca28d7ed9b09330fd103f4779f.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1016/j.jare.2013.12.005"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> elsevier.com </button> </a> <a target="_blank" rel="external noopener" href="https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4294746" title="pubmed link"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> pubmed.gov </button> </a>

Defense of Cyber Infrastructures Against Cyber-Physical Attacks Using Game-Theoretic Models

Nageswara S. V. Rao, Stephen W. Poole, Chris Y. T. Ma, Fei He, Jun Zhuang, David K. Y. Yau
<span title="2015-04-06">2015</span> <i title="Wiley"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/sqhsg45abzhwxd5jbkdh5wn6oa" style="color: black;">Risk Analysis</a> </i> &nbsp;
The operation of cyber infrastructures relies on both cyber and physical components, which are subject to incidental and intentional degradations of different kinds.  ...  Within the context of network and computing infrastructures, we study the strategic interactions between an attacker and a defender using game-theoretic models that take into account both cyber and physical  ...  (28) This article fills this gap by using a single-period, multiple-component, and complete-information game to study the optimal level of defenses on cyber, physical, and combined parts of infrastructures  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1111/risa.12362">doi:10.1111/risa.12362</a> <a target="_blank" rel="external noopener" href="https://www.ncbi.nlm.nih.gov/pubmed/25847370">pmid:25847370</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/vjgwe5oeazcepmu7dfbh3z26fe">fatcat:vjgwe5oeazcepmu7dfbh3z26fe</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200321074317/http://www.eng.buffalo.edu/~jzhuang/Papers/Rao_et_al_RA2015.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/a0/ab/a0ab9fe845b86eb80ff6154a8597a603abd702e0.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1111/risa.12362"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Game Theory for Secure Critical Interdependent Gas-Power-Water Infrastructure [article]

Aidin Ferdowsi, Anibal Sanjab, Walid Saad, Narayan B. Mandayam
<span title="2017-07-14">2017</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
In this paper, a unified model for interdependent gas-power-water infrastructure is presented and the security of this model is studied using a novel game-theoretic framework.  ...  At the mixed strategy Nash equilibrium of this game, numerical results show that the expected power generation cost deviation is 35\% lower than the one resulting from an equal allocation of resources  ...  The security of critical cyber-physical infrastructure in the face of cyber and physical attacks has received increasing attention, recently.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1707.04589v1">arXiv:1707.04589v1</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/k5jiyvwfjjhnfnviwqq3vz4bua">fatcat:k5jiyvwfjjhnfnviwqq3vz4bua</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200826045752/https://arxiv.org/pdf/1707.04589v1.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/b7/94/b79460232d8043f3bae85f99e0bff4d882856b68.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1707.04589v1" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

Cyber Insurance [article]

Quanyan Zhu
<span title="2019-12-28">2019</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
This chapter will first present a principal-agent game-theoretic model to capture the interactions between one insurer and one user.  ...  The behavior of an attacker determines the type of cyber threats, e.g. denial of service (DoS) attacks, data breaches, phishing and spoofing.  ...  The cyber risks at one node can propagate to other nodes when there are cyber, physical, human, and social interdependencies.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1810.00290v2">arXiv:1810.00290v2</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/gsbfcym635bwtlgbzaooboh4k4">fatcat:gsbfcym635bwtlgbzaooboh4k4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200831061548/https://arxiv.org/pdf/1810.00290v2.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/06/82/068261c792a586fc4a1bf77a6d76d6f71d9fe65a.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1810.00290v2" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

Multi-Layer Cyber-Physical Security and Resilience for Smart Grid [article]

Quanyan Zhu
<span title="2018-09-30">2018</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
The chapter will discuss the future directions of using game-theoretic tools in addressing multi-layer security issues in the smart grid.  ...  We discuss game-theoretic applications and challenges in the design of cross-layer robust and resilient controller, secure network routing protocol at the data communication and networking layers, and  ...  The optimal design of the cyber and physical system can be made jointly by viewing each design process as a game-theoretic problem.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1810.00282v1">arXiv:1810.00282v1</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/dyh7dy3jizgvfd4xwg7ij46eu4">fatcat:dyh7dy3jizgvfd4xwg7ij46eu4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20191020011932/https://arxiv.org/pdf/1810.00282v1.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/48/75/4875ac38970c742d6bfa760ca26ab7a629fde8da.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1810.00282v1" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

Cyber-physical Systems (CPS) Security: State of the Art and Research Opportunities for Information Systems Academics

Chetan Kumar, California State University San Marcos, Sean Marston, Ravi Sen, Western Kentucky University, Texas A&M University
<span title="">2020</span> <i title="Association for Information Systems"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/3kocyo3l3zdxdhhey2xm7pjnpy" style="color: black;">Communications of the Association for Information Systems</a> </i> &nbsp;
Attacks on cyber-physical systems (CPS) continue to grow in frequency.  ...  Thus, we require more focused research on cybersecurity based on the cyber-physical relationship between various CPS components.  ...  In the first class of game, each defender minimizes its expected loss subject to budget constraints on the defense investments, while, in the second class of games, each defender minimizes its cost of  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.17705/1cais.04731">doi:10.17705/1cais.04731</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/pyn7uyvwvrhglbktfvlsqc3zeu">fatcat:pyn7uyvwvrhglbktfvlsqc3zeu</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20210601145348/https://aisel.aisnet.org/cgi/viewcontent.cgi?article=4249&amp;context=cais" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/14/0b/140bfbe4c87678fe530a724a59165c0e35906f2c.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.17705/1cais.04731"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

A review of game theory approach to cyber security risk management

D.A. Akinwumi, G.B. Iwasokun, B.K. Alese, S.A. Oluwadare
<span title="2018-01-15">2018</span> <i title="African Journals Online (AJOL)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/v6azywt6zzdwdabxbpbdqfxsn4" style="color: black;">Nigerian Journal of Technology</a> </i> &nbsp;
One of the prominent cyber security risk management techniques is the Game Theoretic Approach (GTA), which focuses on the use of resources, internal controls, information sharing, technical improvements  ...  Specifically, issues on modeling, some related works and significance of game theoretic approach to cyber security risk management are presented.  ...  The authors in [55] , presented a game-theoretic analysis of attack and defense in cyber-physical network infrastructures.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.4314/njt.v36i4.38">doi:10.4314/njt.v36i4.38</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/wcrm6bkcmzajbnkdibd7bwsr6q">fatcat:wcrm6bkcmzajbnkdibd7bwsr6q</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180723232928/https://www.ajol.info/index.php/njt/article/download/164997/154493" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/f0/f2/f0f22af6462e8502bd08d8feb4f291ecba12ab65.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.4314/njt.v36i4.38"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

Optimal and Game-Theoretic Deployment of Security Investments in Interdependent Assets [chapter]

Ashish R. Hota, Abraham A. Clements, Shreyas Sundaram, Saurabh Bagchi
<span title="">2016</span> <i title="Springer International Publishing"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
We formulate the problem of computing the optimal defense allocation by a single defender as a convex optimization problem, and establish the existence of a pure Nash equilibrium of the game between multiple  ...  We introduce a game-theoretic framework to compute optimal and strategic security investments by multiple defenders.  ...  In these cyber-physical systems, interdependencies between the assets owned by different stakeholders have significant implications on the reliability and security of the overall system.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-319-47413-7_6">doi:10.1007/978-3-319-47413-7_6</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/f2xi5h7c5vf6fogx3cftozvxny">fatcat:f2xi5h7c5vf6fogx3cftozvxny</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190223082838/http://pdfs.semanticscholar.org/4c4e/42e51f82f1f3c2cafb594321a639ff6d2105.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/4c/4e/4c4e42e51f82f1f3c2cafb594321a639ff6d2105.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-319-47413-7_6"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Simulation for cybersecurity: state of the art and future directions

Hamdi Kavak, Jose J Padilla, Daniele Vernon-Bido, Saikou Y Diallo, Ross Gore, Sachin Shetty
<span title="2021-01-01">2021</span> <i title="Oxford University Press (OUP)"> Journal of Cybersecurity </i> &nbsp;
The proposed way forward section posits that the advancement of collecting and accessing sociotechnological data to inform models, the creation of new theoretical constructs, and the integration and improvement  ...  In this article, we provide an introduction to simulation for cybersecurity and focus on three themes: (1) an overview of the cybersecurity domain; (2) a summary of notable simulation research efforts  ...  Conflict of interest statement. Authors declare no conflict of interest.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1093/cybsec/tyab005">doi:10.1093/cybsec/tyab005</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/nx72szjmi5bxzdiixmvxa6e6ey">fatcat:nx72szjmi5bxzdiixmvxa6e6ey</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20210410101146/https://watermark.silverchair.com/tyab005.pdf?token=AQECAHi208BE49Ooan9kkhW_Ercy7Dm3ZL_9Cf3qfKAc485ysgAAArMwggKvBgkqhkiG9w0BBwagggKgMIICnAIBADCCApUGCSqGSIb3DQEHATAeBglghkgBZQMEAS4wEQQMYoRfpiQcsTiYPKYaAgEQgIICZtDVm0bDwYAKf0244JzmIqmRWVU-3y1a_2RgQVmSFAI0xowOECgK1IpyH5aIybHkjkzeiLb5ooYR7w6DK9aLApwLdokMbcG2r0lnTcRtvKVjKVWL4oBa1E8OFx6aTVukKPIvCveobwKMZ9RsS7MXErUOAd736NOIm8cYAgQhCzfLZsP_SYo5sMSbTTf76rWPoPGuztxN0yjlcIueR6kigyli_x_wLreZyW5bW7LC3A5uu435jWnEskQtoElQIKSxCNwx1mNEnoSxPw6dR8G_aAA1WxQlebC2eU9btt_NqccBl8UPMJS_iKjyiNat7aFhk9F4Xf2sSt2Zzqm_WVhw-sdNDCo5y_ikmtRUZD8iw8ZqnGP-8-PgXZALmlgAcPvLoU6W0X_e8GRq1SqSDCXFBErSKHqtw4Mt3TRdoLQWeiLfnLWFgpVO-QmrVtB9kS4VHxiVBwb8TDelJWUoJtPUGWU0YHmNMX17j98gEKHExNvmG1Bf6UC93xFM2FhnPO1FlDNoJ8vhq7nv7E5fKwegBhvcHNt3Qg5rERdlWLuXJUMy2R7CuOb50Wnla-rzJS-dTI4VbfaSROmm7IXxsjY9HqmS09aiNRG1fSV5bKvz0lXI5apDZysvcnELt-TVpkJYMFfu0fROUNzYqzaMR8WkDMTpiqTZutf7r_18FSP13XthesyF4uHHE_xcza9JbhqNiVvoqOAyl62O-1D8Fa1bdDs7KSrE5EeJ9GYyoeHUMGNAihqPounrUElwym_J7F68HYPYBRZfxqHOBNiP8--TVDMiv7Q6iK0qpHpbOCDUpsjMHBiuIu_A" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/3f/f0/3ff0fd9733d2bd7f92e04e51f59d38d176b22d56.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1093/cybsec/tyab005"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> oup.com </button> </a>

A survey of methods supporting cyber situational awareness in the context of smart cities

Nataliia Neshenko, Christelle Nader, Elias Bou-Harb, Borko Furht
<span title="2020-10-21">2020</span> <i title="Springer Science and Business Media LLC"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/pkhnkszyprhb3orbf6g7tqmgiu" style="color: black;">Journal of Big Data</a> </i> &nbsp;
Therefore, cyber situational awareness of smart cities emerges as a mission-critical task that requires support methods for effective and timely decision-making.  ...  A modern urban infrastructure no longer operates in isolation, but instead, leverages the latest technologies to collect, process, and distribute aggregated knowledge in order to improve the quality of  ...  Acknowledgements The authors would like to thank the anonymous reviewers for their constructive evaluation of this paper.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1186/s40537-020-00363-0">doi:10.1186/s40537-020-00363-0</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/4o6mbdzgtrastnqsdkjqg23vzi">fatcat:4o6mbdzgtrastnqsdkjqg23vzi</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20201028235440/https://journalofbigdata.springeropen.com/track/pdf/10.1186/s40537-020-00363-0" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/44/e4/44e4c97638ad20121b9e098af26ac257eca4f87a.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1186/s40537-020-00363-0"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> springer.com </button> </a>

Game-Theoretic Decision Making for the Resilience of Interdependent Infrastructures Exposed to Disruptions [chapter]

Yiping Fang, Enrico Zio
<span title="">2019</span> <i title="Springer International Publishing"> Advanced Sciences and Technologies for Security Applications </i> &nbsp;
and advising policymakers on making pre-disruption decisions for improving the resilience of interdependent infrastructures.  ...  A specific set of analytical tools are introduced based on quantitative models of infrastructure systems operation and their functional interdependencies.  ...  Physical interdependency means the state of one CI depends on the material output(s) of the other; cyber interdependency means the state of one CI depends on information transmitted by the information  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-030-00024-0_6">doi:10.1007/978-3-030-00024-0_6</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/lkxc2ofvm5bh3miqttc2tdakwe">fatcat:lkxc2ofvm5bh3miqttc2tdakwe</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200324045256/https://hal.archives-ouvertes.fr/hal-01967981/document" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/4c/f4/4cf4d17fadea348820ef6c6b62d321eef5468513.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-030-00024-0_6"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>
&laquo; Previous Showing results 1 &mdash; 15 out of 1,321 results