Reinforcement Learning for Feedback-Enabled Cyber Resilience

[1]  Changjun Jiang,et al.  DDoS Mitigation Based on Space-Time Flow Regularities in IoV: A Feature Adaption Reinforcement Learning Approach , 2022, IEEE Transactions on Intelligent Transportation Systems.

[2]  Quanyan Zhu,et al.  RADAMS: Resilient and Adaptive Alert and Attention Management Strategy against Informational Denial-of-Service (IDoS) Attacks , 2021, Comput. Secur..

[3]  Quanyan Zhu,et al.  Manipulating Reinforcement Learning: Stealthy Attacks on Cost Signals , 2021, Game Theory and Machine Learning for Cyber Security.

[4]  Quanyan Zhu,et al.  Combating Informational Denial-of-Service (IDoS) Attacks: Modeling and Mitigation of Attentional Human Vulnerability , 2021, GameSec.

[5]  Furong Huang,et al.  Who Is the Strongest Enemy? Towards Optimal and Efficient Evasion Attacks in Deep RL , 2021, ICLR.

[6]  David M. Nicol,et al.  The Ransomware Threat to Energy-Delivery Systems , 2021, IEEE Security & Privacy.

[7]  Faruk Kazi,et al.  An adaptive honeypot using Q-Learning with severity analyzer , 2021, Journal of Ambient Intelligence and Humanized Computing.

[8]  Zhiqin Zhu,et al.  Power system structure optimization based on reinforcement learning and sparse constraints under DoS attacks in cloud environments , 2021, Simul. Model. Pract. Theory.

[9]  I. Linkov,et al.  Cyber Resilience of Systems and Networks , 2021 .

[10]  Quanyan Zhu,et al.  Convergence of Bayesian Nash Equilibrium in Infinite Bayesian Games under Discretization , 2021, ArXiv.

[11]  Danda B. Rawat,et al.  Reinforcement Learning for IoT Security: A Comprehensive Survey , 2021, IEEE Internet of Things Journal.

[12]  Rub'en Majadas,et al.  Disturbing Reinforcement Learning Agents with Corrupted Rewards , 2021, ArXiv.

[13]  Tim Miller,et al.  Deceptive Reinforcement Learning for Privacy-Preserving Planning , 2021, AAMAS.

[14]  Chungang Gao,et al.  Reinforcement learning based self-adaptive moving target defense against DDoS attacks , 2021, Journal of Physics: Conference Series.

[15]  SolarWinds hack will alter US cyber strategy , 2021, Emerald Expert Briefings.

[16]  Sunder Ali Khowaja,et al.  Q-learning and LSTM based deep active learning strategy for malware defense in industrial IoT applications , 2021, Multimedia Tools and Applications.

[17]  Yishay Mansour,et al.  Learning Adversarial Markov Decision Processes with Delayed Feedback , 2020, AAAI.

[18]  Quanyan Zhu,et al.  Cross-Layer Coordinated Attacks on Cyber-Physical Systems: A LQG Game Framework with Controlled Observations , 2020, 2021 European Control Conference (ECC).

[19]  Thiagarajan Ramachandran,et al.  Automated Adversary Emulation for Cyber-Physical Systems via Reinforcement Learning , 2020, 2020 IEEE International Conference on Intelligence and Security Informatics (ISI).

[20]  C. Pal,et al.  Reinforcement Learning with Random Delays , 2020, ICLR.

[21]  Guanghui Wen,et al.  Distributed Reinforcement Learning for Cyber-Physical System With Multiple Remote State Estimation Under DoS Attacker , 2020, IEEE Transactions on Network Science and Engineering.

[22]  Shiqi Wang,et al.  DRL-FAS: A Novel Framework Based on Deep Reinforcement Learning for Face Anti-Spoofing , 2020, IEEE Transactions on Information Forensics and Security.

[23]  Furong Huang,et al.  Vulnerability-Aware Poisoning Mechanism for Online RL with Unknown Dynamics , 2020, ICLR.

[24]  Quanyan Zhu,et al.  Finite-horizon semi-Markov game for time-sensitive attack response and probabilistic risk assessment in nuclear power plants , 2020, Reliab. Eng. Syst. Saf..

[25]  Doina Precup,et al.  Fast reinforcement learning with generalized policy updates , 2020, Proceedings of the National Academy of Sciences.

[26]  Quanyan Zhu,et al.  Farsighted Risk Mitigation of Lateral Movement Using Dynamic Cognitive Honeypots , 2020, GameSec.

[27]  Sailik Sengupta,et al.  Multi-agent Reinforcement Learning in Bayesian Stackelberg Markov Games for Adaptive Moving Target Defense , 2020, ArXiv.

[28]  Mohan Li,et al.  Deep Reinforcement Learning for Partially Observable Data Poisoning Attack in Crowdsensing Systems , 2020, IEEE Internet of Things Journal.

[29]  Yuan Zhao,et al.  DQ-MOTAG: Deep Reinforcement Learning-based Moving Target Defense Against DDoS Attacks , 2020, 2020 IEEE Fifth International Conference on Data Science in Cyberspace (DSC).

[30]  Quanyan Zhu,et al.  Duplicity Games for Deception Design With an Application to Insider Threat Mitigation , 2020, IEEE Transactions on Information Forensics and Security.

[31]  Quanyan Zhu,et al.  Game of Duplicity: A Proactive Automated Defense Mechanism by Deception Design , 2020, ArXiv.

[32]  Chuadhry Mujeeb Ahmed,et al.  DeepBLOC: A Framework for Securing CPS through Deep Reinforcement Learning on Stochastic Games , 2020, 2020 IEEE Conference on Communications and Network Security (CNS).

[33]  Jun Li,et al.  Application-Layer DDoS Defense with Reinforcement Learning , 2020, 2020 IEEE/ACM 28th International Symposium on Quality of Service (IWQoS).

[34]  Divyashikha Sethia,et al.  Q-Bully: A Reinforcement Learning based Cyberbullying Detection Framework , 2020, 2020 International Conference for Emerging Technology (INCET).

[35]  Xiaojin Zhu,et al.  Policy Teaching via Environment Poisoning: Training-time Adversarial Attacks against Reinforcement Learning , 2020, ICML.

[36]  A. Singla,et al.  Adaptive Reward-Poisoning Attacks against Reinforcement Learning , 2020, ICML.

[37]  Manuel López Martín,et al.  Application of deep reinforcement learning to intrusion detection for supervised problems , 2020, Expert Syst. Appl..

[38]  Zengguang Liu,et al.  CPSS LR-DDoS Detection and Defense in Edge Computing Utilizing DCNN Q-Learning , 2020, IEEE Access.

[39]  Quanyan Zhu,et al.  Manipulating Reinforcement Learning: Poisoning Attacks on Cost Signals , 2020, ArXiv.

[40]  Quanyan Zhu Control Challenges for Resilient Control Systems , 2020, ArXiv.

[41]  Quanyan Zhu,et al.  $\mathtt{FlipIn}$ : A Game-Theoretic Cyber Insurance Framework for Incentive-Compatible Cyber Risk Management of Internet of Things , 2019, IEEE Transactions on Information Forensics and Security.

[42]  Hui Xiong,et al.  A Comprehensive Survey on Transfer Learning , 2019, Proceedings of the IEEE.

[43]  Quanyan Zhu,et al.  Dynamic games for secure and resilient control system design , 2019, National science review.

[44]  Xiaojin Zhu,et al.  Policy Poisoning in Batch Reinforcement Learning and Control , 2019, NeurIPS.

[45]  Quanyan Zhu,et al.  On Convergence Rate of Adaptive Multiscale Value Function Approximation for Reinforcement Learning , 2019, 2019 IEEE 29th International Workshop on Machine Learning for Signal Processing (MLSP).

[46]  Ion Bica,et al.  On the rewards of self-adaptive IoT honeypots , 2019, Ann. des Télécommunications.

[47]  Quanyan Zhu,et al.  Continuous-Time Markov Decision Processes with Controlled Observations , 2019, 2019 57th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[48]  Quanyan Zhu,et al.  A Dynamic Game Framework for Rational and Persistent Robot Deception With an Application to Deceptive Pursuit-Evasion , 2019, IEEE Transactions on Automation Science and Engineering.

[49]  Moitrayee Chatterjee,et al.  Detecting Phishing Websites through Deep Reinforcement Learning , 2019, 2019 IEEE 43rd Annual Computer Software and Applications Conference (COMPSAC).

[50]  Wei Ren,et al.  On the Control of Multi-Agent Systems: A Survey , 2019, Found. Trends Syst. Control..

[51]  Rashmi Ranjan Rout,et al.  Deep Q-Learning and Particle Swarm Optimization for Bot Detection in Online Social Networks , 2019, 2019 10th International Conference on Computing, Communication and Networking Technologies (ICCCNT).

[52]  Quanyan Zhu,et al.  Adaptive Honeypot Engagement through Reinforcement Learning of Semi-Markov Decision Processes , 2019, GameSec.

[53]  Quanyan Zhu,et al.  A Dynamic Games Approach to Proactive Defense Strategies against Advanced Persistent Threats in Cyber-Physical Systems , 2019, Comput. Secur..

[54]  Quanyan Zhu,et al.  Deceptive Reinforcement Learning Under Adversarial Manipulations on Cost Signals , 2019, GameSec.

[55]  Guang-Hong Yang,et al.  LQ Secure Control for Cyber-Physical Systems Against Sparse Sensor and Actuator Attacks , 2019, IEEE Transactions on Control of Network Systems.

[56]  Martin Mullins,et al.  Connected and autonomous vehicles: A cyber-risk classification framework , 2019, Transportation Research Part A: Policy and Practice.

[57]  Quanyan Zhu,et al.  A Differential Game Approach to Decentralized Virus-Resistant Weight Adaptation Policy Over Complex Networks , 2019, IEEE Transactions on Control of Network Systems.

[58]  Naima Kaabouch,et al.  Social Engineering Attacks: A Survey , 2019, Future Internet.

[59]  Junfeng Wang,et al.  Evading Anti-Malware Engines With Deep Reinforcement Learning , 2019, IEEE Access.

[60]  Ying Chen,et al.  Evaluation of Reinforcement Learning-Based False Data Injection Attack to Automatic Voltage Control , 2019, IEEE Transactions on Smart Grid.

[61]  Zhen Ni,et al.  A Multistage Game in Smart Grid Security: A Reinforcement Learning Solution , 2019, IEEE Transactions on Neural Networks and Learning Systems.

[62]  Peter Henderson,et al.  An Introduction to Deep Reinforcement Learning , 2018, Found. Trends Mach. Learn..

[63]  Tao Jiang,et al.  Deep Reinforcement Learning for Mobile Edge Caching: Review, New Features, and Open Issues , 2018, IEEE Network.

[64]  Sachin Shetty,et al.  Cyber Resilience Framework for Industrial Control Systems: Concepts, Metrics, and Insights , 2018, 2018 IEEE International Conference on Intelligence and Security Informatics (ISI).

[65]  Shan Liu,et al.  Event-triggered resilient control for cyber-physical system under denial-of-service attacks , 2018, Int. J. Control.

[66]  Bo Li,et al.  Reinforcement Learning with Perturbed Rewards , 2018, AAAI.

[67]  Chong Li,et al.  Online Cyber-Attack Detection in Smart Grid: A Reinforcement Learning Approach , 2018, IEEE Transactions on Smart Grid.

[68]  Enda Barrett,et al.  Using Reinforcement Learning to Conceal Honeypot Functionality , 2018, ECML/PKDD.

[69]  Quanyan Zhu,et al.  Adaptive Strategic Cyber Defense for Advanced Persistent Threats in Critical Infrastructure Networks , 2018, PERV.

[70]  Quanyan Zhu,et al.  DISTRIBUTED AND OPTIMAL RESILIENT PLANNING OF LARGE-SCALE INTERDEPENDENT CRITICAL INFRASTRUCTURES , 2018, 2018 Winter Simulation Conference (WSC).

[71]  Jürgen Schmidhuber,et al.  Recurrent World Models Facilitate Policy Evolution , 2018, NeurIPS.

[72]  Liang Xiao,et al.  IoT Security Techniques Based on Machine Learning: How Do IoT Devices Use AI to Enhance Security? , 2018, IEEE Signal Processing Magazine.

[73]  Jianhua Li,et al.  Deep Reinforcement Learning based Smart Mitigation of DDoS Flooding in Software-Defined Networks , 2018, 2018 IEEE 23rd International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD).

[74]  Nicola Bezzo,et al.  An IRL Approach for Cyber-Physical Attack Intention Prediction and Recovery , 2018, 2018 Annual American Control Conference (ACC).

[75]  Arslan Munir,et al.  Adversarial Reinforcement Learning Framework for Benchmarking Collision Avoidance Mechanisms in Autonomous Vehicles , 2018, IEEE Intelligent Transportation Systems Magazine.

[76]  Liang Xiao,et al.  DQN-Based Power Control for IoT Transmission against Jamming , 2018, 2018 IEEE 87th Vehicular Technology Conference (VTC Spring).

[77]  Mugen Peng,et al.  Learning-Based Defense against Malicious Unmanned Aerial Vehicles , 2018, 2018 IEEE 87th Vehicular Technology Conference (VTC Spring).

[78]  Igor Linkov,et al.  Fundamental Concepts of Cyber Resilience: Introduction and Overview , 2018, Cyber Resilience of Systems and Networks.

[79]  Walid Saad,et al.  Robust Deep Reinforcement Learning for Security and Safety in Autonomous Vehicle Systems , 2018, 2018 21st International Conference on Intelligent Transportation Systems (ITSC).

[80]  Jianye Hao,et al.  Falsification of Cyber-Physical Systems Using Deep Reinforcement Learning , 2018, IEEE Transactions on Software Engineering.

[81]  M. Schukat,et al.  Improving adaptive honeypot functionality with efficient reinforcement learning parameters for automated malware , 2018, Journal of Cyber Security Technology.

[82]  Xin Huang,et al.  Reliable Control Policy of Cyber-Physical Systems Against a Class of Frequency-Constrained Sensor and Actuator Attacks , 2018, IEEE Transactions on Cybernetics.

[83]  Nauman Aslam,et al.  Detection of online phishing email using dynamic evolving neural network based on reinforcement learning , 2018, Decis. Support Syst..

[84]  Xiang Chen,et al.  Security in Mobile Edge Caching with Reinforcement Learning , 2018, IEEE Wireless Communications.

[85]  Quanyan Zhu,et al.  A Game-theoretic Taxonomy and Survey of Defensive Deception for Cybersecurity and Privacy , 2017, ACM Comput. Surv..

[86]  Xiaojiang Du,et al.  Reinforcement Learning Based Mobile Offloading for Cloud-Based Malware Detection , 2017, GLOBECOM 2017 - 2017 IEEE Global Communications Conference.

[87]  Hao Xu,et al.  Deep reinforecement learning based optimal defense for cyber-physical system in presence of unknown cyber-attack , 2017, 2017 IEEE Symposium Series on Computational Intelligence (SSCI).

[88]  Sushil Jajodia,et al.  Detecting Stealthy Botnets in a Resource-Constrained Environment using Reinforcement Learning , 2017, MTD@CCS.

[89]  Quanyan Zhu,et al.  A Large-Scale Markov Game Approach to Dynamic Protection of Interdependent Infrastructure Networks , 2017, GameSec.

[90]  Sergey Levine,et al.  Neural Network Dynamics for Model-Based Deep Reinforcement Learning with Model-Free Fine-Tuning , 2017, 2018 IEEE International Conference on Robotics and Automation (ICRA).

[91]  Razvan Pascanu,et al.  Imagination-Augmented Agents for Deep Reinforcement Learning , 2017, NIPS.

[92]  Benjamin Van Roy,et al.  A Tutorial on Thompson Sampling , 2017, Found. Trends Mach. Learn..

[93]  Lukasz Kaiser,et al.  Attention is All you Need , 2017, NIPS.

[94]  Quanyan Zhu,et al.  A Game-Theoretic Approach to Secure Control of Communication-Based Train Control Systems Under Jamming Attacks , 2017, SCAV@CPSWeek.

[95]  Quanyan Zhu,et al.  A Bi-Level Game Approach to Attack-Aware Cyber Insurance of Computer Networks , 2017, IEEE Journal on Selected Areas in Communications.

[96]  H. Vincent Poor,et al.  Two-dimensional anti-jamming communication based on deep reinforcement learning , 2017, 2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[97]  Liang Xiao,et al.  Active authentication with reinforcement learning based on ambient radio signals , 2017, Multimedia Tools and Applications.

[98]  Rick S. Blum,et al.  GPS spoofing attack characterization and detection in smart grids , 2016, 2016 IEEE Conference on Communications and Network Security (CNS).

[99]  Sudharman K. Jayaweera,et al.  Reinforcement learning based anti-jamming with wideband autonomous cognitive radios , 2016, 2016 IEEE/CIC International Conference on Communications in China (ICCC).

[100]  David Last,et al.  Forecasting Zero-Day Vulnerabilities , 2016, CISRC.

[101]  Jiming Chen,et al.  Cyber Security for Industrial Control Systems : From the Viewpoint of Close-Loop , 2016 .

[102]  Pietro Tesi,et al.  Resilient control under Denial-of-Service: Robust design , 2016, 2016 American Control Conference (ACC).

[103]  Alex Graves,et al.  Asynchronous Methods for Deep Reinforcement Learning , 2016, ICML.

[104]  Weihua Zhuang,et al.  PHY-Layer Spoofing Detection With Reinforcement Learning in Wireless Networks , 2016, IEEE Transactions on Vehicular Technology.

[105]  Demis Hassabis,et al.  Mastering the game of Go with deep neural networks and tree search , 2016, Nature.

[106]  Erhan Guven,et al.  A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection , 2016, IEEE Communications Surveys & Tutorials.

[107]  Quanyan Zhu,et al.  Attack-Aware Cyber Insurance for Risk Sharing in Computer Networks , 2015, GameSec.

[108]  Quanyan Zhu,et al.  Compliance Control: Managed Vulnerability Surface in Social-Technological Systems via Signaling Games , 2015, MIST@CCS.

[109]  Joseph D. Prusa,et al.  Survey of review spam detection using machine learning techniques , 2015, Journal of Big Data.

[110]  Joel J. P. C. Rodrigues,et al.  On resilience of Wireless Mesh routing protocol against DoS attacks in IoT-based ambient assisted living applications , 2015, 2015 17th International Conference on E-health Networking, Application & Services (HealthCom).

[111]  Daniel Kudenko,et al.  Distributed response to network intrusions using multiagent reinforcement learning , 2015, Eng. Appl. Artif. Intell..

[112]  Sergey Levine,et al.  Trust Region Policy Optimization , 2015, ICML.

[113]  Quanyan Zhu,et al.  Game-Theoretic Methods for Robustness, Security, and Resilience of Cyberphysical Control Systems: Games-in-Games Principle for Optimal Cross-Layer Resilient Control Systems , 2015, IEEE Control Systems.

[114]  Weihua Zhuang,et al.  Spoofing Detection with Reinforcement Learning in Wireless Networks , 2014, 2015 IEEE Global Communications Conference (GLOBECOM).

[115]  Guy Lever,et al.  Deterministic Policy Gradient Algorithms , 2014, ICML.

[116]  Quanyan Zhu,et al.  Game-Theoretic Approach to Feedback-Driven Multi-stage Moving Target Defense , 2013, GameSec.

[117]  Quanyan Zhu,et al.  Resilient control of cyber-physical systems against Denial-of-Service attacks , 2013, 2013 6th International Symposium on Resilient Control Systems (ISRCS).

[118]  Bogdan Gabrys,et al.  Metalearning: a survey of trends and technologies , 2013, Artificial Intelligence Review.

[119]  Daniel Kudenko,et al.  Multiagent Router Throttling: Decentralized Coordinated Response Against DDoS Attacks , 2013, IAAI.

[120]  Quanyan Zhu,et al.  Game theory meets network security and privacy , 2013, CSUR.

[121]  Quanyan Zhu,et al.  Dependable Demand Response Management in the Smart Grid: A Stackelberg Game Approach , 2013, IEEE Transactions on Smart Grid.

[122]  Eric Cole,et al.  Advanced Persistent Threat: Understanding the Danger and How to Protect Your Organization , 2012 .

[123]  Quanyan Zhu,et al.  Deceptive Routing in Relay Networks , 2012, GameSec.

[124]  Quanyan Zhu,et al.  Interference Aware Routing Game for Cognitive Radio Multi-Hop Networks , 2012, IEEE Journal on Selected Areas in Communications.

[125]  Quanyan Zhu,et al.  A game-theoretic framework for control of distributed renewable-based energy resources in smart grids , 2012, 2012 American Control Conference (ACC).

[126]  Paulo Tabuada,et al.  Secure Estimation and Control for Cyber-Physical Systems Under Adversarial Attacks , 2012, IEEE Transactions on Automatic Control.

[127]  Karl Henrik Johansson,et al.  Attack models and scenarios for networked control systems , 2012, HiCoNS '12.

[128]  Quanyan Zhu,et al.  Dynamic Secure Routing Game in Distributed Cognitive Radio Networks , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.

[129]  Walid Saad,et al.  Eavesdropping and jamming in next-generation wireless networks: A game-theoretic approach , 2011, 2011 - MILCOM 2011 Military Communications Conference.

[130]  Radu State,et al.  Adaptive and self-configurable honeypots , 2011, 12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops.

[131]  Ralph Langner,et al.  Stuxnet: Dissecting a Cyberwarfare Weapon , 2011, IEEE Security & Privacy.

[132]  Tamer Basar,et al.  Optimal control in the presence of an intelligent jammer with limited actions , 2010, 49th IEEE Conference on Decision and Control (CDC).

[133]  Vern Paxson,et al.  Outside the Closed World: On Using Machine Learning for Network Intrusion Detection , 2010, 2010 IEEE Symposium on Security and Privacy.

[134]  Quanyan Zhu,et al.  Dynamic policy-based IDS configuration , 2009, Proceedings of the 48h IEEE Conference on Decision and Control (CDC) held jointly with 2009 28th Chinese Control Conference.

[135]  S. Shankar Sastry,et al.  Research Challenges for the Security of Control Systems , 2008, HotSec.

[136]  S. Shankar Sastry,et al.  Secure Control: Towards Survivable Cyber-Physical Systems , 2008, 2008 The 28th International Conference on Distributed Computing Systems Workshops.

[137]  Jing Wu,et al.  Design of Networked Control Systems With Packet Dropouts , 2007, IEEE Transactions on Automatic Control.

[138]  Xin Xu,et al.  Defending DDoS Attacks Using Hidden Markov Models and Cooperative Reinforcement Learning , 2007, PAISI.

[139]  Jose J. Gonzalez,et al.  A Framework for Conceptualizing Social Engineering Attacks , 2006, CRITIS.

[140]  Marti A. Hearst,et al.  Why phishing works , 2006, CHI.

[141]  Sigurd Skogestad,et al.  Control structure design for complete chemical plants , 2004, Comput. Chem. Eng..

[142]  Konstantinos V. Katsikopoulos,et al.  Markov decision processes with delays and asynchronous cost collection , 2003, IEEE Trans. Autom. Control..

[143]  Ricardo Vilalta,et al.  A Perspective View and Survey of Meta-Learning , 2002, Artificial Intelligence Review.

[144]  Yishay Mansour,et al.  Policy Gradient Methods for Reinforcement Learning with Function Approximation , 1999, NIPS.

[145]  T. Tsubone,et al.  Stabilizing and destabilizing control for a piecewise-linear circuit , 1998 .

[146]  Karl Johan Åström,et al.  Theory and applications of adaptive control - A survey , 1983, Autom..

[147]  Quanyan Zhu,et al.  INADVERT: An Interactive and Adaptive Counterdeception Platform for Attention Enhancement and Phishing Prevention , 2021, ArXiv.

[148]  Zinovi Rabinovich,et al.  Transferable Environment Poisoning: Training-time Attack on Reinforcement Learning , 2021, AAMAS.

[149]  Szu-Hao Huang,et al.  Adversarial Attacks Against Reinforcement Learning-Based Portfolio Management Strategy , 2021, IEEE Access.

[150]  Dong Seong Kim,et al.  DESOLATER: Deep Reinforcement Learning-Based Resource Allocation and Moving Target Defense Deployment Framework , 2021, IEEE Access.

[151]  Sushil Jajodia,et al.  Adaptive Autonomous Secure Cyber Systems , 2020 .

[152]  Guangming Tang,et al.  An Intelligent Deployment Policy for Deception Resources Based on Reinforcement Learning , 2020, IEEE Access.

[153]  Quanyan Zhu,et al.  Cross-Layer Framework for CPSs , 2020 .

[154]  Yevgeniy Vorobeychik,et al.  Adversarial Deep Reinforcement Learning Based Adaptive Moving Target Defense , 2020, GameSec.

[155]  Industrial Control Systems Security and Resiliency: Practice and Theory , 2019, Advances in Information Security.

[156]  Quanyan Zhu,et al.  A game theoretic approach for responding to cyber-attacks on nuclear power plants , 2019 .

[157]  Ion Bica,et al.  QRASSH - A Self-Adaptive SSH Honeypot Driven by Q-Learning , 2018, 2018 International Conference on Communications (COMM).

[158]  Grace Hui Yang,et al.  Use of Interpersonal Deception Theory in Counter Social Engineering , 2018, CIKM Workshops.

[159]  Juliane Junker,et al.  Lyapunov Based Control Of Mechanical Systems , 2016 .

[160]  Quanyan Zhu,et al.  Hierarchical architectures of resilient control systems: Concepts, metrics and design principles , 2015 .

[161]  Yilin Mo,et al.  False Data Injection Attacks in Control Systems , 2010 .

[162]  Dimitri P. Bertsekas,et al.  Neuro-Dynamic Programming , 2009, Encyclopedia of Optimization.

[163]  Dawn M. Cappelli,et al.  Combating the Insider Cyber Threat , 2008, IEEE Security & Privacy.

[164]  Lubomír Bakule,et al.  Decentralized control: An overview , 2008, Annu. Rev. Control..

[165]  J. P. Gupta,et al.  Securing oil and gas infrastructure , 2007 .

[166]  Daniel Kudenko,et al.  Multi-agent Reinforcement Learning for Intrusion Detection , 2007, Adaptive Agents and Multi-Agents Systems.

[167]  Richard S. Sutton,et al.  Reinforcement Learning: An Introduction , 1998, IEEE Trans. Neural Networks.

[168]  Neal Krawetz,et al.  Anti-honeypot technology , 2004, IEEE Security & Privacy Magazine.

[169]  Michael O. Duff,et al.  Reinforcement Learning Methods for Continuous-Time Markov Decision Problems , 1994, NIPS.

[170]  Gavriel Salomon,et al.  T RANSFER OF LEARNING , 1992 .

[171]  Donald E. Kirk,et al.  Optimal control theory : an introduction , 1970 .