Game theoretical security detection strategy for networked systems
From MaRDI portal
Publication:2195399
DOI10.1016/j.ins.2018.04.051zbMath1448.91032OpenAlexW2801962073WikidataQ129949674 ScholiaQ129949674MaRDI QIDQ2195399
Changyun Wen, Hao Wu, Wei Wang, Zhengguo Li
Publication date: 8 September 2020
Published in: Information Sciences (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ins.2018.04.051
Applications of game theory (91A80) Multistage and repeated games (91A20) Networked control (93B70) Games with incomplete information, Bayesian games (91A27)
Related Items (3)
A reputation game on cyber-security and cyber-risk calibration ⋮ A generalized approach to solve perfect Bayesian Nash equilibrium for practical network attack and defense ⋮ Optimal encryption strategy for cyber-physical systems against stealthy attacks with energy constraints: a Stackelberg game approach
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Fault recoverability and fault tolerant control for a class of interconnected nonlinear systems
- Distributed fault detection for interconnected second-order systems
- Distributed algorithms for the computation of noncooperative equilibria
- Relaxation techniques and asynchronous algorithms for on-line computation of non-cooperative equilibria
- Security of interdependent and identical networked control systems
- Newton's method for computing a normalized equilibrium in the generalized Nash game through fixed point formulation
- Output feedback control of networked control systems with packet dropouts in both channels
- Game theory meets network security and privacy
- Network Security
- Existence and Uniqueness of Equilibrium Points for Concave N-Person Games
This page was built for publication: Game theoretical security detection strategy for networked systems