Security protection design for deception and real system regimes: a model and analysis
From MaRDI portal
Publication:1037682
DOI10.1016/J.EJOR.2009.03.022zbMATH Open1179.90193OpenAlexW2092321730MaRDI QIDQ1037682FDOQ1037682
Authors: J. Blot
Publication date: 16 November 2009
Published in: European Journal of Operational Research (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ejor.2009.03.022
Recommendations
- Design of Stealthy Deception Attacks With Partial System Knowledge
- Security of networked control systems subject to deception attacks: a survey
- A secure strategy for a cyber physical system with multi-sensor under linear deception attack
- Deception tactics for network interdiction: a multiobjective approach
- Formalization of the problem of protection against reconnaissance in conflict systems
Cites Work
- Location of terror response facilities: a game between state and terrorist
- Optimal resource allocation with minimum activation levels and fixed costs
- Market Segmentation, Cannibalization, and the Timing of Product Introductions
- A decisional framework system for computer network intrusion detection
- Efficient scheduling of periodic information monitoring requests
This page was built for publication: Security protection design for deception and real system regimes: a model and analysis
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1037682)