Cyber-Physical Security: A Game Theory Model of Humans Interacting Over Control Systems
暂无分享,去创建一个
Russell Bent | Scott Backhaus | David H. Wolpert | Brendan D. Tracey | Ritchie Lee | Yildiray Yildiz | James W. Bono | Dongping Xie | D. Wolpert | S. Backhaus | R. Bent | J. Bono | Dongping Xie | Ritchie Lee | Y. Yildiz
[1] Tansu Alpcan,et al. Network Security , 2010 .
[2] David H. Wolpert,et al. Predicting Behavior in Unstructured Bargaining with a Probability Distribution , 2010, J. Artif. Intell. Res..
[3] Richard S. Sutton,et al. Reinforcement Learning: An Introduction , 1998, IEEE Trans. Neural Networks.
[4] Jeannette M. Wing,et al. Game strategies in network security , 2005, International Journal of Information Security.
[5] Quanyan Zhu,et al. GUIDEX: A Game-Theoretic Incentive-Based Mechanism for Intrusion Detection Networks , 2012, IEEE Journal on Selected Areas in Communications.
[6] Peng Liu,et al. Incentive-based modeling and inference of attacker intent, objectives, and strategies , 2003, CCS '03.
[7] D. Wolpert,et al. Distribution-Valued Solution Concepts , 2013 .
[8] M. E. Baran,et al. Optimal sizing of capacitors placed on a radial distribution system , 1989 .
[9] D. Wolpert,et al. Decision-Theoretic Prediction and Policy Design of GDP Slot Auctions , 2013 .
[10] Niels Provos,et al. Proceedings of the 3rd conference on Hot topics in security , 2008 .
[11] E. Lehrer. Repeated Games with Stationary Bounded Recall Strategies , 1988 .
[12] Andrew W. Moore,et al. Reinforcement Learning: A Survey , 1996, J. Artif. Intell. Res..
[13] Quanyan Zhu,et al. Game theory meets network security and privacy , 2013, CSUR.
[14] J. Eto,et al. Understanding the cost of power interruptions to U.S. electricity consumers , 2004 .
[15] Ariel Rubinstein,et al. A Course in Game Theory , 1995 .
[16] William H. Sanders,et al. RRE: A Game-Theoretic Intrusion Response and Recovery Engine , 2014, IEEE Transactions on Parallel and Distributed Systems.
[17] Michael I. Jordan,et al. Reinforcement Learning Algorithm for Partially Observable Markov Decision Problems , 1994, NIPS.
[18] Cristina Comaniciu,et al. A Bayesian game approach for intrusion detection in wireless ad hoc networks , 2006, GameNets '06.
[19] Bart De Schutter,et al. Reinforcement Learning and Dynamic Programming Using Function Approximators , 2010 .
[20] David H. Wolpert,et al. PGT: A Statistical Approach to Prediction and Mechanism Design , 2010, SBP.
[21] David H. Wolpert,et al. Game Theoretic Modeling of Pilot Behavior During Mid-Air Encounters , 2011, ArXiv.
[22] S. Shankar Sastry,et al. Research Challenges for the Security of Control Systems , 2008, HotSec.
[23] Tansu Alpcan,et al. Stochastic games for security in networks with interdependent nodes , 2009, 2009 International Conference on Game Theory for Networks.
[24] Russell Bent,et al. Counter-Factual Reinforcement Learning: How to Model Decision-Makers That Anticipate the Future , 2012, Decision Making and Imperfection.