Optimal Secure Interdependent Infrastructure Network Design
暂无分享,去创建一个
[1] F. Harary. THE MAXIMUM CONNECTIVITY OF A GRAPH. , 1962, Proceedings of the National Academy of Sciences of the United States of America.
[2] Quanyan Zhu,et al. A Stackelberg Game Approach for Two-Level Distributed Energy Management in Smart Grids , 2016, IEEE Transactions on Smart Grid.
[3] Quanyan Zhu,et al. Networked cyber-physical systems: Interdependence, resilience and information exchange , 2013, 2013 51st Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[4] Amitav Mukherjee,et al. Physical-Layer Security in the Internet of Things: Sensing and Communication Confidentiality Under Resource Constraints , 2015, Proceedings of the IEEE.
[5] Quanyan Zhu,et al. Resilient and decentralized control of multi-level cooperative mobile networks to maintain connectivity under adversarial environment , 2015, 2016 IEEE 55th Conference on Decision and Control (CDC).
[6] Quanyan Zhu,et al. A factored MDP approach to optimal mechanism design for resihent large-scale interdependent critical infrastructures , 2017, 2017 Workshop on Modeling and Simulation of Cyber-Physical Energy Systems (MSCPES).
[7] Quanyan Zhu,et al. Security investment under cognitive constraints: A Gestalt Nash equilibrium approach , 2018, 2018 52nd Annual Conference on Information Sciences and Systems (CISS).
[8] Quanyan Zhu,et al. A Large-Scale Markov Game Approach to Dynamic Protection of Interdependent Infrastructure Networks , 2017, GameSec.
[9] Quanyan Zhu,et al. iSTRICT: An Interdependent Strategic Trust Mechanism for the Cloud-Enabled Internet of Controlled Things , 2018, IEEE Transactions on Information Forensics and Security.
[10] Quanyan Zhu,et al. Heterogeneous Multi-Layer Adversarial Network Design for the IoT-Enabled Infrastructures , 2017, GLOBECOM 2017 - 2017 IEEE Global Communications Conference.
[11] Niraj K. Jha,et al. A Comprehensive Study of Security of Internet-of-Things , 2017, IEEE Transactions on Emerging Topics in Computing.
[12] Quanyan Zhu,et al. Game-Theoretic Approach to Feedback-Driven Multi-stage Moving Target Defense , 2013, GameSec.
[13] Weisong Shi,et al. Wireless Sensor Network Security: A Survey , 2006 .
[14] K. D. Jaegher,et al. Strategic Network Disruption and Defense , 2016 .
[15] Geir M. Køien,et al. Cyber Security and the Internet of Things: Vulnerabilities, Threats, Intruders and Attacks , 2015, J. Cyber Secur. Mobil..
[16] Steeve Zozor,et al. 2D time-frequency interference modelling using stochastic geometry for performance evaluation in Low-Power Wide-Area Networks , 2016, 2017 IEEE International Conference on Communications (ICC).
[17] Jonathan L. Gross,et al. Handbook of graph theory , 2007, Discrete mathematics and its applications.
[18] Quanyan Zhu,et al. Factored markov game theory for secure interdependent infrastructure networks , 2018 .
[19] Quanyan Zhu,et al. A Multi-Layer Feedback System Approach to Resilient Connectivity of Remotely Deployed Mobile Internet of Things , 2018, IEEE Transactions on Cognitive Communications and Networking.
[20] Quanyan Zhu,et al. Cognitive Connectivity Resilience in Multi-Layer Remotely Deployed Mobile Internet of Things , 2017, GLOBECOM 2017 - 2017 IEEE Global Communications Conference.
[21] Quanyan Zhu,et al. A Game-Theoretic Framework for Resilient and Distributed Generation Control of Renewable Energies in Microgrids , 2016, IEEE Transactions on Smart Grid.
[22] Loukas Lazos,et al. Selective jamming/dropping insider attacks in wireless mesh networks , 2011, IEEE Network.
[23] Saswati Sarkar,et al. Maximum Damage Battery Depletion Attack in Mobile Sensor Networks , 2011, IEEE Transactions on Automatic Control.
[24] Asuman E. Ozdaglar,et al. Network Security and Contagion , 2013, PERV.
[25] Rolf H. Weber,et al. Internet of Things - New security and privacy challenges , 2010, Comput. Law Secur. Rev..
[26] Quanyan Zhu,et al. A Linear Quadratic Differential Game Approach to Dynamic Contract Design for Systemic Cyber Risk Management under Asymmetric Information , 2018, 2018 56th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[27] Mashrur Chowdhury,et al. Vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communication in a heterogeneous wireless network – Performance evaluation , 2016 .
[28] Quanyan Zhu,et al. Interdependent strategic cyber defense and robust switching control design for wind energy systems , 2017, 2017 IEEE Power & Energy Society General Meeting.
[29] Quanyan Zhu,et al. Optimal Secure Two-Layer IoT Network Design , 2017, IEEE Transactions on Control of Network Systems.
[30] Corinne Touati,et al. Optimal Design and Defense of Networks Under Link Attacks , 2017 .
[31] Quanyan Zhu,et al. On the Secure and Reconfigurable Multi-Layer Network Design for Critical Information Dissemination in the Internet of Battlefield Things (IoBT) , 2018, IEEE Transactions on Wireless Communications.
[32] Nicholas Hopper,et al. Vampire Attacks: Draining Life from Wireless Ad Hoc Sensor Networks , 2013, IEEE Transactions on Mobile Computing.
[33] Adrian Perrig,et al. Distributed detection of node replication attacks in sensor networks , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[34] Quanyan Zhu,et al. Resilient control design for wind turbines using Markov jump linear system model with lévy noise , 2015, 2015 IEEE International Conference on Smart Grid Communications (SmartGridComm).
[35] Quanyan Zhu,et al. Security as a Service for Cloud-Enabled Internet of Controlled Things Under Advanced Persistent Threats: A Contract Design Approach , 2017, IEEE Transactions on Information Forensics and Security.
[36] Quanyan Zhu,et al. Optimal Contract Design Under Asymmetric Information for Cloud-Enabled Internet of Controlled Things , 2016, GameSec.
[37] Quanyan Zhu,et al. DISTRIBUTED AND OPTIMAL RESILIENT PLANNING OF LARGE-SCALE INTERDEPENDENT CRITICAL INFRASTRUCTURES , 2018, 2018 Winter Simulation Conference (WSC).
[38] Quanyan Zhu,et al. A Dynamic Game Analysis and Design of Infrastructure Network Protection and Recovery: 125 , 2017, PERV.
[39] S. Goyal,et al. Attack, Defence, and Contagion in Networks , 2014 .
[40] Quanyan Zhu,et al. Secure and Resilient Control Design for Cloud Enabled Networked Control Systems , 2015, CPS-SPC '15.
[41] Quanyan Zhu,et al. Adaptive Strategic Cyber Defense for Advanced Persistent Threats in Critical Infrastructure Networks , 2018, PERV.
[42] Quanyan Zhu,et al. A Dynamic Game Approach to Strategic Design of Secure and Resilient Infrastructure Network , 2019, IEEE Transactions on Information Forensics and Security.
[43] Jie Li,et al. Resilience of Routing in Parallel Link Networks , 2016, GameSec.
[44] Marcin Dziubinski,et al. Network Design and Defence , 2012, Games Econ. Behav..
[45] Quanyan Zhu,et al. Interdependent Strategic Security Risk Management With Bounded Rationality in the Internet of Things , 2019, IEEE Transactions on Information Forensics and Security.
[46] Quanyan Zhu,et al. Interdependent network formation games with an application to critical infrastructures , 2016, 2016 American Control Conference (ACC).