Game-Theoretic Approach to Feedback-Driven Multi-stage Moving Target Defense
暂无分享,去创建一个
[1] Jörgen W. Weibull,et al. Evolutionary Game Theory , 1996 .
[2] Sushil Jajodia,et al. Moving Target Defense II: Application of Game Theory and Adversarial Modeling , 2012 .
[3] V. Borkar. Stochastic Approximation: A Dynamical Systems Viewpoint , 2008, Texts and Readings in Mathematics.
[4] Sushil Jajodia,et al. Moving Target Defense - Creating Asymmetric Uncertainty for Cyber Threats , 2011, Moving Target Defense.
[5] Quanyan Zhu,et al. A hierarchical security architecture for smart grid , 2010 .
[6] C. Cannings,et al. Evolutionary Game Theory , 2010 .
[7] Ronald L. Rivest,et al. Defending against the Unknown Enemy: Applying FlipIt to System Security , 2012, GameSec.
[8] John S. Baras,et al. Decision and Game Theory for Security , 2010, Lecture Notes in Computer Science.
[9] Sushil Jajodia,et al. Moving Target Defense II , 2013, Advances in Information Security.
[10] Frank L. Lewis,et al. Reinforcement Learning And Approximate Dynamic Programming For Feedback Control , 2016 .
[11] Mark Fabro,et al. Control Systems Cyber Security: Defense-in-Depth Strategies , 2006 .
[12] Jeannette M. Wing,et al. An Attack Surface Metric , 2011, IEEE Transactions on Software Engineering.
[13] Quanyan Zhu,et al. Distributed strategic learning with application to network security , 2011, Proceedings of the 2011 American Control Conference.
[14] Quanyan Zhu,et al. Dynamic policy-based IDS configuration , 2009, Proceedings of the 48h IEEE Conference on Decision and Control (CDC) held jointly with 2009 28th Chinese Control Conference.
[15] Quanyan Zhu,et al. Hybrid Learning in Stochastic Games and Its Application in Network Security , 2013 .
[16] Quanyan Zhu,et al. Game theory meets network security and privacy , 2013, CSUR.
[17] T. Başar,et al. Dynamic Noncooperative Game Theory, 2nd Edition , 1998 .
[18] Quanyan Zhu,et al. Deceptive Routing in Relay Networks , 2012, GameSec.
[19] Indrajit Ray,et al. Dynamic Security Risk Management Using Bayesian Attack Graphs , 2012, IEEE Transactions on Dependable and Secure Computing.
[20] T. Başar,et al. Dynamic Noncooperative Game Theory , 1982 .
[21] Angelos D. Keromytis,et al. Countering code-injection attacks with instruction-set randomization , 2003, CCS '03.
[22] Quanyan Zhu,et al. An impact-aware defense against Stuxnet , 2013, 2013 American Control Conference.
[23] William H. Sandholm,et al. Excess payoff dynamics and other well-behaved evolutionary dynamics , 2005, J. Econ. Theory.
[24] Michael E. Locasto,et al. Software Diversity: Security, Entropy and Game Theory , 2012, HotSec.
[25] Chen-Ching Liu,et al. Vulnerability Assessment of Cybersecurity for SCADA Systems Using Attack Trees , 2007, 2007 IEEE Power Engineering Society General Meeting.
[26] Gene F. Franklin,et al. Feedback Control of Dynamic Systems , 1986 .
[27] D. Fudenberg,et al. The Theory of Learning in Games , 1998 .
[28] Quanyan Zhu,et al. Deceptive routing games , 2012, 2012 IEEE 51st IEEE Conference on Decision and Control (CDC).
[29] Quanyan Zhu,et al. Heterogeneous learning in zero-sum stochastic games with incomplete information , 2011, 49th IEEE Conference on Decision and Control (CDC).