Filters








8,866 Hits in 9.0 sec

Security Optimization of Dynamic Networks with Probabilistic Graph Modeling and Linear Programming

Hussain M.J. Almohri, Layne T. Watson, Danfeng Yao, Xinming Ou
2016 IEEE Transactions on Dependable and Secure Computing  
We describe a probabilistic graph model and algorithms for analyzing the security of complex networks with the ultimate goal of reducing the probability of successful attacks.  ...  Our model naturally utilizes a scalable state-of-the-art optimization technique called sequential linear programming that is extensively applied and studied in various engineering problems.  ...  Our probabilistic model supports the computation of optimal network security defense strategies.  ... 
doi:10.1109/tdsc.2015.2411264 fatcat:qfge7ez6znbbjmgxop6unybsty

A Receding-Horizon MDP Approach for Performance Evaluation of Moving Target Defense in Networks [article]

Zhentian Qian, Jie Fu, Quanyan Zhu
2020 arXiv   pre-print
We model the network system using a probabilistic attack graph--a graphical security model.  ...  Given a network system with a proactive defense strategy, an intelligent attacker needs to perform reconnaissance repeatedly to learn about the locations of intrusion detection systems and re-plan optimally  ...  To this end, we model the network with dynamic defense as a time-varying probabilistic attack graph, which can be modeled as a Markov Decision Process (MDP) with a time-varying probabilistic transition  ... 
arXiv:2002.05146v3 fatcat:xgxqfgh7rzfvldyipw6d566lea

Modeling Attacker-Defender Interaction as a Zero-Sum Stochastic Game

E.O. Ibidunmoye, B.K. Alese, O.S. Ogundele
2013 Journal of Computer Sciences and Applications  
Game-theoretic modeling of computer security views security attack scenarios as an optimization game comprising of multiple players notably the attackers and the defenders (system administrators).  ...  Our solution involves reducing each state game into a min and max linear programming problems for both the defender and attacker respectively.  ...  It has also been shown how the complexity of network components, the dynamic nature of underlying network environment, and probabilistic nature of player strategies can be captured in one model to predict  ... 
doi:10.12691/jcsa-1-2-3 fatcat:3q4mjptbtjbj3iem675ysbxxta

A Game-theoretic Scenario for Modelling the Attacker-Defender Interaction

Ibidunmoye EO Alese BK
2013 Journal of Computer Engineering and Information Technology  
Stochastic security games are a probabilistic approach appropriate for studying particularly complex networks where attacks often go from a state and proceeds to another according to a probability distribution  ...  A stochastic game-model that views the interaction between malicious users and network administrators as a two-player zerosum game was developed.  ...  It has also been shown how the complexity of network components, the dynamic nature of underlying network environment, and probabilistic nature of player strategies can be captured in one model to predict  ... 
doi:10.4172/2324-9307.1000103 fatcat:v3tdjfzrnvadnbulpyijisuaxq

Scanning the Issue*

2019 IEEE Transactions on Automatic Control  
We model distributed linear consensus and vehicular formation control problems over toric lattice networks and develop a framework for evaluating asymptotic scalings (in network size) of global performance  ...  This paper discusses the controllability of networked dynamical systems (NDSs) with unknown parameters both in their subsystems (heterogeneous) dynamics and in their interconnections.  ...  Structural Controllability of a Networked Dynamic System With LFT Perturbed Subsystems (18-0921) Yuan Zhang and Tong Zhou This paper discusses the controllability of networked dynamical systems (NDSs  ... 
doi:10.1109/tac.2019.2952442 fatcat:wnfzvd3zdfcaho65j2agb662fi

Mitigating hard capacity constraints with inventory in facility location modeling

Kayse Lee Maass, Mark S. Daskin, Siqian Shen
2015 IIE Transactions  
Matrix operations, basic convex analysis, mathematical modeling with emphasis on linear programming; introduction to integer programming, network optimization, and dynamic programming; simplex algorithms  ...  Demand forecasting, inventory control, EOQ model, news-vendors problem, fundamentals of linear programming and network optimization, classical network flow models, the bullwhip effect, facility location  ... 
doi:10.1080/0740817x.2015.1078015 fatcat:hag2xzcyrjhvhl2rqzx3dtu4wa

Optimal firm wind capacity allocation to power systems with security constraints

D. J. Burke, M. J. O'Malley
2009 2009 IEEE/PES Power Systems Conference and Exposition  
This paper uses a sequential probabilistic load flow method in tandem with a linear programming computational geometry constraint redundancy approach to optimally allocate wind capacities given the transmission  ...  The volume of wind power connection applications and their power production statistical inter-dependencies suggest that they should be assessed in a collective probabilistic manner.  ...  The DC load flow model is linear, and thus linear constraints can be formulated to represent network security criteria in the optimization stage.  ... 
doi:10.1109/psce.2009.4840126 fatcat:lhe6it5cp5coxbk2n3ad77lxqy

An Exhaustive Survey on Physical Node Capture Attack in WSN

Bhavana Butani, Piyush Kumar Shukla, Sanjay Silakari
2014 International Journal of Computer Applications  
So, Security of wireless sensor network is an important issue for maintaining confidentiality and integrity of wireless links.  ...  Our survey provides deep insights of existing modeling techniques of node capture attack in wireless sensor network.  ...  By using probabilistic analysis of logical key graphs with linear control theory, they proposed a dynamical model that efficiently describes network behavior under attack.  ... 
doi:10.5120/16577-6265 fatcat:umstipzwtzcfpdwqj4myexq2fe

2020 Index IEEE Transactions on Cybernetics Vol. 50

2020 IEEE Transactions on Cybernetics  
., and Gao, H., Reference Trajectory Reshaping Optimi-zation and Control of Robotic Exoskeletons for Human-Robot Co-Manipulation; TCYB Aug. 2020 3740-3751 Wu, X., Jiang, B., Yu, K., Miao, c., and Chen,  ...  ., +, TCYB May 2020 1887-1899 Hidden Markov Model-Based Nonfragile State Estimation of Switched Neu- ral Network With Probabilistic Quantized Outputs.  ...  Yao, T., +, TCYB Dec. 2020 4896-4907 Hidden Markov Model-Based Nonfragile State Estimation of Switched Neural Network With Probabilistic Quantized Outputs.  ... 
doi:10.1109/tcyb.2020.3047216 fatcat:5giw32c2u5h23fu4drupnh644a

Optimization models for energy reallocation in a smart grid

Kendall E. Nygard, Steve Bou Ghosn, Md. Minhaz Chowdhury, Davin Loegering, Ryan McCulloch, Prakash Ranganathan
2011 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)  
To address this need, we present a collection of integer linear programming (ILP) models designed to identify optimal combinations of supply sources, demand sites for them to serve, and the pathways along  ...  A simulator configured with multiple intelligent distributed software agents has been developed to support the evaluation of the model solutions.  ...  Integer Linear Programming (ILP) models often arise from node-arc network formulations. Network models of this type date to the pioneering work of Ford and Fulkerson [17] .  ... 
doi:10.1109/infcomw.2011.5928804 fatcat:bt46t4yglvgcxhpe7lljxujuh4

Table of Contents

2019 IEEE Transactions on Sustainable Energy  
Filho 952 Robust Optimal Control of Wave Energy Converters Based on Adaptive Dynamic Programming . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  ...  (Contents Continued from Front Cover) Spatio-Temporal Graph Deep Neural Network for Short-Term Wind Speed Forecasting . . . . . . M. Khodayar and J.  ... 
doi:10.1109/tste.2019.2902764 fatcat:d3y7wirl25as5ah3ny5fiinomm

Optimized and Executive Survey of Physical Node Capture Attack in Wireless Sensor Network

Bhavana Butani, Piyush Kumar Shukla, Sanjay Silakari
2014 International Journal of Computer Network and Information Security  
So, Security of wireless sensor network is an important issue for maintaining confidentiality and integrity of wireless links.  ...  Node capture attack is one of the most dreadful security attack exist in wireless sensor networks.  ...  By using probabilistic analysis of logical key graphs with linear control theory, they proposed a dynamical model that efficiently describes network behavior under attack.  ... 
doi:10.5815/ijcnis.2014.11.04 fatcat:qwl6acebejdoxnxht2hrcjzxiu

2020 Index IEEE Transactions on Control of Network Systems Vol. 7

2020 IEEE Transactions on Control of Network Systems  
., +, TCNS Dec. 2020 1929-1939 Biological system modeling Behavioral and Game-Theoretic Security Investments in Interdependent Systems Modeled by Attack Graphs.  ...  ., +, TCNS Dec. 2020 1848-1858 Convex programming Combinatorial Optimization of AC Optimal Power Flow With Discrete Demands in Radial Networks.  ... 
doi:10.1109/tcns.2020.3048651 fatcat:ydlonetqinfcpaxiy4itp7tsw4

Operations research at CLAIO XVII (ALIO/SMIO Joint International Meeting)

Roger Z. Ríos-Mercado, José Luis González-Velarde, Manuel Laguna
2017 Annals of Operations Research  
Traditionally, the CLAIO series of conferences have highlighted recent developments in theory, models, algorithms, and applications of operations research in the broadest sense.  ...  These conferences have succeeded in achieving the goals of fostering the exchange of research among leading investigators, establishing and deepening ties between researchers and practitioners, and helping  ...  Finally, we thank all authors who submitted their work to allow CLAIO and the Annals of Operations Research be the outlet of their fine research work.  ... 
doi:10.1007/s10479-017-2699-5 fatcat:t7732viaufa23mvxzq35xu4b2a

On maximum lifetime routing in Wireless Sensor Networks

Xu Ning, Christos G. Cassandras
2009 Proceedings of the 48h IEEE Conference on Decision and Control (CDC) held jointly with 2009 28th Chinese Control Conference  
This paper considers first the problem of routing in a WSN with the objective of lifetime maximization based on a simple model for battery dynamics.  ...  Finally, we present a more realistic model for battery dynamics, and numerically solve the lifetime maximization problem.  ...  Starting from a different perspective -a model for the battery dynamics, [8] formulates an optimal control problem for lifetime maximization with probabilistic routing.  ... 
doi:10.1109/cdc.2009.5400394 dblp:conf/cdc/NingC09 fatcat:mclcph6e6jhb5e3mxvccnlygpu
« Previous Showing results 1 — 15 out of 8,866 results