Security protection design for deception and real system regimes: a model and analysis
From MaRDI portal
(Redirected from Publication:1037682)
Recommendations
- Design of Stealthy Deception Attacks With Partial System Knowledge
- Security of networked control systems subject to deception attacks: a survey
- A secure strategy for a cyber physical system with multi-sensor under linear deception attack
- Deception tactics for network interdiction: a multiobjective approach
- Formalization of the problem of protection against reconnaissance in conflict systems
Cites work
- A decisional framework system for computer network intrusion detection
- Efficient scheduling of periodic information monitoring requests
- Location of terror response facilities: a game between state and terrorist
- Market Segmentation, Cannibalization, and the Timing of Product Introductions
- Optimal resource allocation with minimum activation levels and fixed costs
This page was built for publication: Security protection design for deception and real system regimes: a model and analysis
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1037682)