Security Investment in Cyber-Physical Systems: Stochastic Games With Asymmetric Information and Resource-Constrained Players
暂无分享,去创建一个
Tamer Basar | Xudong Zhao | Wei Xing | Weiguo Xia | T. Başar | Weiguo Xia | Xudong Zhao | Wei Xing
[1] Ben Niu,et al. Single‐network ADP for solving optimal event‐triggered tracking control problem of completely unknown nonlinear systems , 2021, Int. J. Intell. Syst..
[2] H. W. Kuhn. EXTENSIVE GAMES AND THE PROBLEM OF INFORMATION , 2020, Classics in Game Theory.
[3] Tongwen Chen,et al. Multi-sensor transmission power control for remote estimation through a SINR-based communication channel , 2019, Autom..
[4] Hao Liu,et al. SINR-based multi-channel power schedule under DoS attacks: A Stackelberg game approach with incomplete information , 2019, Autom..
[5] Tamer Basar,et al. Communication scheduling and remote estimation with adversarial intervention , 2019, IEEE/CAA Journal of Automatica Sinica.
[6] Ling Shi,et al. SINR-Based DoS Attack on Remote State Estimation: A Game-Theoretic Approach , 2017, IEEE Transactions on Control of Network Systems.
[7] Tamer Başar,et al. Dynamic Games With Asymmetric Information and Resource Constrained Players With Applications to Security of Cyberphysical Systems , 2017, IEEE Transactions on Control of Network Systems.
[8] Ling Shi,et al. A secure cross-layer design for remote estimation under DoS attack: When multi-sensor meets multi-channel , 2016, 2016 IEEE 55th Conference on Decision and Control (CDC).
[9] Tamer Basar,et al. Optimal communication scheduling and remote estimation over an additive noise channel , 2016, Autom..
[10] Ling Shi,et al. Optimal DoS Attack Scheduling in Wireless Networked Control System , 2016, IEEE Transactions on Control Systems Technology.
[11] Yi Ouyang,et al. Dynamic Games With Asymmetric Information: Common Information Based Perfect Bayesian Equilibria and Sequential Decomposition , 2015, IEEE Transactions on Automatic Control.
[12] Ling Shi,et al. Optimal Denial-of-Service Attack Scheduling With Energy Constraint , 2015, IEEE Transactions on Automatic Control.
[13] Quanyan Zhu,et al. Game-Theoretic Methods for Robustness, Security, and Resilience of Cyberphysical Control Systems: Games-in-Games Principle for Optimal Cross-Layer Resilient Control Systems , 2015, IEEE Control Systems.
[14] Bruno Sinopoli,et al. Detecting Integrity Attacks on SCADA Systems , 2014, IEEE Transactions on Control Systems Technology.
[15] Tamer Basar,et al. Common Information Based Markov Perfect Equilibria for Stochastic Games With Asymmetric Information: Finite Games , 2014, IEEE Transactions on Automatic Control.
[16] Ling Shi,et al. How Can Online Schedules Improve Communication and Estimation Tradeoff? , 2013, IEEE Transactions on Signal Processing.
[17] Tamer Basar,et al. Optimal Strategies for Communication and Remote Estimation With an Energy Harvesting Sensor , 2012, IEEE Transactions on Automatic Control.
[18] Gerhard P. Hancke,et al. Industrial Wireless Sensor Networks: Challenges, Design Principles, and Technical Approaches , 2009, IEEE Transactions on Industrial Electronics.
[19] Bruno Sinopoli,et al. Foundations of Control and Estimation Over Lossy Networks , 2007, Proceedings of the IEEE.
[20] Tamer Basar,et al. Optimal control of LTI systems over unreliable communication links , 2006, Autom..
[21] T. Başar,et al. Optimal Estimation with Limited Measurements , 2005, Proceedings of the 44th IEEE Conference on Decision and Control.
[22] Bhaskar Krishnamachari,et al. Experimental study of the effects of transmission power control and blacklisting in wireless sensor networks , 2004, 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004. IEEE SECON 2004..
[23] J. Hespanha,et al. Nash equilibria in partial-information games on Markov chains , 2001, Proceedings of the 40th IEEE Conference on Decision and Control (Cat. No.01CH37228).
[24] E. Altman. Constrained Markov Decision Processes , 1999 .
[25] Petros G. Voulgaris,et al. On optimal ℓ∞ to ℓ∞ filtering , 1995, Autom..
[26] Tamer Basar,et al. Stochastic Differential Games and Intricacy of Information Structures , 2014 .
[27] S. Shankar Sastry,et al. Security of interdependent and identical networked control systems , 2013, Autom..
[28] Jérôme Renault,et al. Repeated Games with Incomplete Information , 2009, Encyclopedia of Complexity and Systems Science.
[29] Bruno Sinopoli,et al. Challenges for Securing Cyber Physical Systems , 2009 .
[30] T. Başar,et al. Dynamic Noncooperative Game Theory , 1982 .