Dynamic games in cyber-physical security: an overview
DOI10.1007/S13235-018-00291-YzbMATH Open1431.91052OpenAlexW2907907364WikidataQ128648344 ScholiaQ128648344MaRDI QIDQ2292106FDOQ2292106
Authors: Tamer Başar, Seyed Rasoul Etesami
Publication date: 3 February 2020
Published in: Dynamic Games and Applications (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s13235-018-00291-y
Recommendations
- Dynamic game theories in cyber security
- Non-equilibrium dynamic games and cyber-physical security: a cognitive hierarchy approach
- A hybrid stochastic game for secure control of cyber-physical systems
- A game-theoretic method for cross-layer stochastic resilient control design in CPS
- Discrete game-theoretic analysis of defense in correlated cyber-physical systems
Applications of game theory (91A80) Research exposition (monographs, survey articles) pertaining to game theory, economics, and finance (91-02) Stochastic games, stochastic differential games (91A15) Dynamic games (91A25) Signaling and communication in game theory (91A28) Hierarchical games (including Stackelberg games) (91A65) Mechanism design theory (91B03)
Cites Work
- Title not available (Why is that?)
- Prospect Theory: An Analysis of Decision under Risk
- Game theory meets network security and privacy
- Comparing human behavior models in repeated Stackelberg security games: an extended study
- Incentive Stackelberg Strategies for a Dynamic Game on Terrorism
- Network security. A decision and game-theoretic approach.
- Zero-sum repeated games: recent advances and new links with differential games
- Computing optimal randomized resource allocations for massive security games
- Jamming Attacks on Remote State Estimation in Cyber-Physical Systems: A Game-Theoretic Approach
- A Game-Theoretical Approach for Finding Optimal Strategies in a Botnet Defense Model
- Game-Theoretic Methods for Robustness, Security, and Resilience of Cyberphysical Control Systems: Games-in-Games Principle for Optimal Cross-Layer Resilient Control Systems
- Optimum coding and decoding schemes for the transmission of a stochastic process over a continuous-time stochastic channel with partially unknown statisticst†
- The Gaussian test channel with an intelligent jammer
- A bandwidth expanding scheme for communication channels with noiseless feedback in the presence of unknown jamming noise
- Solutions to a class of minimax decision problems arising in communication systems
- Dynamic Games With Asymmetric Information: Common Information Based Perfect Bayesian Equilibria and Sequential Decomposition
- A dynamic incentive mechanism for security in networks of interdependent agents
- Security Assessment of Electricity Distribution Networks Under DER Node Compromises
- Dynamic Games With Asymmetric Information and Resource Constrained Players With Applications to Security of Cyberphysical Systems
- Jamming in mobile networks: a game-theoretic approach
- A complete characterization of minimax and maximin encoder- decoder policies for communication channels with incomplete statistical description
- Communication games with partially soft power constraints
- Deception-based game theoretical approach to mitigate DoS attacks
- Optimal Zero-Delay Jamming Over an Additive Noise Channel
- Patrolling a pipeline
- A point-based approximate algorithm for one-sided partially observable pursuit-evasion games
- Dynamics on linear influence network games under stochastic environments
- Towards optimal algorithms for prediction with expert advice
- A Dynamic Bayesian Security Game Framework for Strategic Defense Mechanism Design
- gPath: A Game-Theoretic Path Selection Algorithm to Protect Tor’s Anonymity
- Risk averse Stackelberg security games with quantal response
- Strategies for voter-initiated election audits
- A game-theoretic analysis of deception over social networks using fake avatars
- Network Elicitation in Adversarial Environment
- Optimal thresholds for anomaly-based intrusion detection in dynamical environments
- On communication over Gaussian sensor networks with adversaries: further results
- Incentives and information security
- Optimum linear causal coding schemes for Gaussian stochastic processes in the presence of correlated jamming
- Jamming Games in the MIMO Wiretap Channel With an Active Eavesdropper
- Dynamic game theories in cyber security
- Using signaling games to model the multi-step attack-defense scenarios on confidentiality
- Deceptive routing in relay networks
Cited In (25)
- Discrete game-theoretic analysis of defense in correlated cyber-physical systems
- Game theory and industrial control systems
- A game-theoretic method for cross-layer stochastic resilient control design in CPS
- Cooperative linear quadratic differential games for uncertain systems with conservative players
- Learning Machiavellian strategies for manipulation in Stackelberg security games
- Cyber-physical correlation effects in defense games for large discrete infrastructures
- Security from the adversary's inertia-controlling convergence speed when playing mixed strategy equilibria
- Games of timing for security in dynamic environments
- Analysis and computation of adaptive defense strategies against advanced persistent threats for cyber-physical systems
- Non-equilibrium dynamic games and cyber-physical security: a cognitive hierarchy approach
- A survey of network interdiction models and algorithms
- Online learning in budget-constrained dynamic Colonel Blotto games
- Engineering secure self-adaptive systems with Bayesian games
- Game-Theoretic Methods for Robustness, Security, and Resilience of Cyberphysical Control Systems: Games-in-Games Principle for Optimal Cross-Layer Resilient Control Systems
- Adjustability in robust linear optimization
- Dynamic game theories in cyber security
- Feedback linear quadratic Nash equilibrium for discrete-time Markov jump linear systems
- A large-scale Markov game approach to dynamic protection of interdependent infrastructure networks
- A hybrid stochastic game for secure control of cyber-physical systems
- Integer programming methods for solving binary interdiction games
- \(\varepsilon\)-Nash equilibrium of non-cooperative Lagrangian dynamic games based on the average sub-gradient robust integral sliding mode control
- Game theoretic modeling of economic denial of sustainability (EDoS) attack in cloud computing
- Dynamic Games With Asymmetric Information and Resource Constrained Players With Applications to Security of Cyberphysical Systems
- Cut-the-rope: a game of stealthy intrusion
- Feedback and open-loop Nash equilibria for LQ infinite-horizon discrete-time dynamic games
Uses Software
This page was built for publication: Dynamic games in cyber-physical security: an overview
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2292106)