Factored markov game theory for secure interdependent infrastructure networks
暂无分享,去创建一个
[1] Quanyan Zhu,et al. Game-Theoretic Methods for Robustness, Security, and Resilience of Cyberphysical Control Systems: Games-in-Games Principle for Optimal Cross-Layer Resilient Control Systems , 2015, IEEE Control Systems.
[2] Shalabh Bhatnagar,et al. A Generalized Reduced Linear Program for Markov Decision Processes , 2015, AAAI.
[3] Quanyan Zhu,et al. Resilient and decentralized control of multi-level cooperative mobile networks to maintain connectivity under adversarial environment , 2015, 2016 IEEE 55th Conference on Decision and Control (CDC).
[4] Jeff S. Shamma,et al. LP formulation of asymmetric zero-sum stochastic games , 2014, 53rd IEEE Conference on Decision and Control.
[5] Quanyan Zhu,et al. A factored MDP approach to optimal mechanism design for resihent large-scale interdependent critical infrastructures , 2017, 2017 Workshop on Modeling and Simulation of Cyber-Physical Energy Systems (MSCPES).
[6] Min Ouyang,et al. Review on modeling and simulation of interdependent critical infrastructure systems , 2014, Reliab. Eng. Syst. Saf..
[7] Quanyan Zhu,et al. Security as a Service for Cloud-Enabled Internet of Controlled Things Under Advanced Persistent Threats: A Contract Design Approach , 2017, IEEE Transactions on Information Forensics and Security.
[8] Peter L. Bartlett,et al. Linear Programming for Large-Scale Markov Decision Problems , 2014, ICML.
[9] John E. Mitchell,et al. Restoration of Services in Interdependent Infrastructure Systems: A Network Flows Approach , 2007, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).
[10] Quanyan Zhu,et al. Game-Theoretic Approach to Feedback-Driven Multi-stage Moving Target Defense , 2013, GameSec.
[11] Quanyan Zhu,et al. Flip the Cloud: Cyber-Physical Signaling Games in the Presence of Advanced Persistent Threats , 2015, GameSec.
[12] J. Filar,et al. Competitive Markov Decision Processes , 1996 .
[13] Quanyan Zhu,et al. Optimal Contract Design Under Asymmetric Information for Cloud-Enabled Internet of Controlled Things , 2016, GameSec.
[14] Shobha Venkataraman,et al. Efficient Solution Algorithms for Factored MDPs , 2003, J. Artif. Intell. Res..
[15] Vittorio Rosato,et al. Modelling interdependent infrastructures using interacting dynamical models , 2008, Int. J. Crit. Infrastructures.
[16] John D. Moteff,et al. Critical Infrastructure and Key Assets: Definition and Identification , 2004 .
[17] Quanyan Zhu,et al. Interdependent network formation games with an application to critical infrastructures , 2016, 2016 American Control Conference (ACC).
[18] Quanyan Zhu,et al. Network Security Configurations: A Nonzero-Sum Stochastic Game Approach , 2010, Proceedings of the 2010 American Control Conference.
[19] Quanyan Zhu,et al. Game theory meets network security and privacy , 2013, CSUR.
[20] Quanyan Zhu,et al. GUIDEX: A Game-Theoretic Incentive-Based Mechanism for Intrusion Detection Networks , 2012, IEEE Journal on Selected Areas in Communications.
[21] Michail G. Lagoudakis,et al. Learning in Zero-Sum Team Markov Games Using Factored Value Functions , 2002, NIPS.
[22] Benjamin Van Roy,et al. On Constraint Sampling in the Linear Programming Approach to Approximate Dynamic Programming , 2004, Math. Oper. Res..
[23] James P. Peerenboom,et al. Identifying, understanding, and analyzing critical infrastructure interdependencies , 2001 .
[24] Quanyan Zhu,et al. A Stochastic Game Model for Jamming in Multi-Channel Cognitive Radio Systems , 2010, 2010 IEEE International Conference on Communications.