Stochastic game approach for replay attack detection
暂无分享,去创建一个
[1] Yishay Mansour,et al. Fast Planning in Stochastic Games , 2000, UAI.
[2] Panganamala Ramana Kumar,et al. Cyber–Physical Systems: A Perspective at the Centennial , 2012, Proceedings of the IEEE.
[3] Quanyan Zhu,et al. Dynamic policy-based IDS configuration , 2009, Proceedings of the 48h IEEE Conference on Decision and Control (CDC) held jointly with 2009 28th Chinese Control Conference.
[4] Andrzej S. Nowak,et al. Approximation theorems for zero-sum nonstationary stochastic games , 1984 .
[5] S. Shankar Sastry,et al. Secure Control: Towards Survivable Cyber-Physical Systems , 2008, 2008 The 28th International Conference on Distributed Computing Systems Workshops.
[6] Quanyan Zhu,et al. Game theory meets network security and privacy , 2013, CSUR.
[7] Dimitris Bertsimas,et al. Robust game theory , 2006, Math. Program..
[8] Karl Henrik Johansson,et al. Attack models and scenarios for networked control systems , 2012, HiCoNS '12.
[9] S. Shankar Sastry,et al. Research Challenges for the Security of Control Systems , 2008, HotSec.
[10] Jill Slay,et al. Lessons Learned from the Maroochy Water Breach , 2007, Critical Infrastructure Protection.
[11] Bruno Sinopoli,et al. Detecting Integrity Attacks on SCADA Systems , 2014, IEEE Transactions on Control Systems Technology.
[12] H. Vincent Poor,et al. On minimax robustness: A general approach and applications , 1984, IEEE Trans. Inf. Theory.
[13] Bruno Sinopoli,et al. Secure control against replay attacks , 2009, 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton).