Towards High-Resolution Multi-Stage Security Games
暂无分享,去创建一个
[1] Meikang Qiu,et al. Impact of Cyber-Attacks on Critical Infrastructure , 2016, 2016 IEEE 2nd International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing (HPSC), and IEEE International Conference on Intelligent Data and Security (IDS).
[2] Tyler Moore,et al. The Economics of Information Security , 2006, Science.
[3] Quanyan Zhu,et al. Game theory meets network security and privacy , 2013, CSUR.
[4] Aron Laszka,et al. Banishing Misaligned Incentives for Validating Reports in Bug-Bounty Platforms , 2016, ESORICS.
[5] Rafal Rohozinski,et al. Stuxnet and the Future of Cyber War , 2011 .
[6] Gábor Horváth,et al. FlipThem: Modeling Targeted Attacks with FlipIt for Multiple Resources , 2014, GameSec.
[7] Jill Slay,et al. Lessons Learned from the Maroochy Water Breach , 2007, Critical Infrastructure Protection.
[8] Saurabh Amin,et al. Vulnerability of Transportation Networks to Traffic-Signal Tampering , 2016, 2016 ACM/IEEE 7th International Conference on Cyber-Physical Systems (ICCPS).
[9] Yevgeniy Vorobeychik,et al. Computing Stackelberg Equilibria in Discounted Stochastic Games , 2012, AAAI.
[10] Jerzy A. Filar,et al. Competitive Markov decision processes : with 57 illustrations , 1997 .
[11] Ehud D. Karnin,et al. On secret sharing systems , 1983, IEEE Trans. Inf. Theory.
[12] Peter Dayan,et al. Technical Note: Q-Learning , 2004, Machine Learning.
[13] Carl E. Landwehr,et al. Basic concepts and taxonomy of dependable and secure computing , 2004, IEEE Transactions on Dependable and Secure Computing.
[14] Aron Laszka,et al. Resilient wireless sensor networks for cyber-physical systems , 2016 .
[15] John Musacchio,et al. Computing the Nash Equilibria of Intruder Classification Games , 2012, GameSec.
[16] Yevgeniy Vorobeychik,et al. Optimal Thresholds for Anomaly-Based Intrusion Detection in Dynamical Environments , 2016, GameSec.
[17] John Musacchio,et al. A Game-Theoretic Analysis of Adversarial Classification , 2017, IEEE Transactions on Information Forensics and Security.
[18] J. Tsitsiklis,et al. Actor-citic agorithms , 1999, NIPS 1999.
[19] Carlos F. Daganzo,et al. THE CELL TRANSMISSION MODEL, PART II: NETWORK TRAFFIC , 1995 .
[20] Milind Tambe,et al. Security and Game Theory - Algorithms, Deployed Systems, Lessons Learned , 2011 .
[21] Nicanor Quijano,et al. Response and reconfiguration of cyber-physical control systems: A survey , 2015, 2015 IEEE 2nd Colombian Conference on Automatic Control (CCAC).
[22] Ing-Ray Chen,et al. A survey of intrusion detection techniques for cyber-physical systems , 2014, ACM Comput. Surv..
[23] S. Shankar Sastry,et al. Optimal thresholds for intrusion detection systems , 2016, HotSoS.
[24] Avrim Blum,et al. Planning in the Presence of Cost Functions Controlled by an Adversary , 2003, ICML.
[25] William Enck,et al. A Study of Security Isolation Techniques , 2016, ACM Comput. Surv..
[26] Haifeng Xu,et al. Deceiving Cyber Adversaries: A Game Theoretic Approach , 2018, AAMAS.
[27] Ming Zhang,et al. A Game Theoretic Model for Defending Against Stealthy Attacks with Limited Resources , 2015, GameSec.
[28] Ronald L. Rivest,et al. FlipIt: The Game of “Stealthy Takeover” , 2012, Journal of Cryptology.
[29] C. Daganzo. THE CELL TRANSMISSION MODEL.. , 1994 .
[30] Lawrence A. Gordon,et al. The economics of information security investment , 2002, TSEC.
[31] Shane Legg,et al. Human-level control through deep reinforcement learning , 2015, Nature.
[32] J. Alex Halderman,et al. Green Lights Forever: Analyzing the Security of Traffic Infrastructure , 2014, WOOT.
[33] Abhishek Dubey,et al. Optimal detection of faulty traffic sensors used in route planning , 2017, SCOPE@CPSWeek.
[34] Peng Liu,et al. An Empirical Study of Web Vulnerability Discovery Ecosystems , 2015, CCS.
[35] Jens Myrup Pedersen,et al. of Network Traffic , 2011 .
[36] Tal Rabin,et al. Verifiable secret sharing and multiparty protocols with honest majority , 1989, STOC '89.
[37] Ronald L. Rivest,et al. Defending against the Unknown Enemy: Applying FlipIt to System Security , 2012, GameSec.
[38] Aron Laszka,et al. Mitigating Covert Compromises - A Game-Theoretic Model of Targeted and Non-Targeted Covert Attacks , 2013, WINE.
[39] Peter Stone,et al. Deep Recurrent Q-Learning for Partially Observable MDPs , 2015, AAAI Fall Symposia.
[40] Garth Lewis,et al. What is Multi-Factor Authentication? , 2007 .
[41] James Aspnes,et al. Inoculation strategies for victims of viruses and the sum-of-squares partition problem , 2005, SODA '05.
[42] Vincent Conitzer,et al. Stackelberg vs. Nash in Security Games: An Extended Investigation of Interchangeability, Equivalence, and Uniqueness , 2011, J. Artif. Intell. Res..
[43] Levente Buttyán,et al. A Survey of Interdependent Information Security Games , 2014, ACM Comput. Surv..
[44] Peter Dayan,et al. Q-learning , 1992, Machine Learning.
[45] Bo An,et al. Computing Solutions in Infinite-Horizon Discounted Adversarial Patrolling Games , 2014, ICAPS.
[46] J. Filar,et al. Competitive Markov Decision Processes , 1996 .
[47] Kenneth P. Birman,et al. The Monoculture Risk Put into Context , 2009, IEEE Security & Privacy Magazine.
[48] Harish Sethu,et al. On achieving software diversity for improved network security using distributed coloring algorithms , 2004, CCS '04.
[49] Branislav Bosanský,et al. Game Theoretic Model of Strategic Honeypot Selection in Computer Networks , 2012, GameSec.