Game-Theoretic Methods for Robustness, Security, and Resilience of Cyberphysical Control Systems: Games-in-Games Principle for Optimal Cross-Layer Resilient Control Systems
暂无分享,去创建一个
[1] Mark Fabro,et al. Control Systems Cyber Security: Defense-in-Depth Strategies , 2006 .
[2] Craig G. Rieger. Notional examples and benchmark aspects of a resilient control system , 2010, 2010 3rd International Symposium on Resilient Control Systems.
[3] Ahmad Haidar,et al. Robust stability criteria for Markovian jump singular systems with time-varying delays , 2008, 2008 47th IEEE Conference on Decision and Control.
[4] Quanyan Zhu,et al. Heterogeneous learning in zero-sum stochastic games with incomplete information , 2011, 49th IEEE Conference on Decision and Control (CDC).
[5] H. Zimmermann,et al. OSI Reference Model - The ISO Model of Architecture for Open Systems Interconnection , 1980, IEEE Transactions on Communications.
[6] Quanyan Zhu,et al. Dynamic policy-based IDS configuration , 2009, Proceedings of the 48h IEEE Conference on Decision and Control (CDC) held jointly with 2009 28th Chinese Control Conference.
[7] Quanyan Zhu,et al. Hybrid Learning in Stochastic Games and Its Application in Network Security , 2013 .
[8] Quanyan Zhu,et al. A dynamic game-theoretic approach to resilient control system design for cascading failures , 2012, HiCoNS '12.
[9] David Salt,et al. Resilience Thinking : Sustaining Ecosystems and People in a Changing World , 2017 .
[10] Alejandro D. Domínguez-García,et al. A Generalized Fault Coverage Model for Linear Time-Invariant Systems , 2009, IEEE Transactions on Reliability.
[11] Quanyan Zhu,et al. Resilient Distributed Control of Multi-agent Cyber-Physical Systems , 2013, CPSW@CISS.
[12] Brian Randell,et al. Reliability Issues in Computing System Design , 1978, CSUR.
[13] J. Doyle,et al. Essentials of Robust Control , 1997 .
[14] M. Price. Panarchy: Understanding Transformations in Human and Natural Systems , 2003 .
[15] John K Munro,et al. Cybersecurity through Real-Time Distributed Control Systems , 2010 .
[16] Jim Kurose,et al. Computer Networking: A Top-Down Approach (6th Edition) , 2007 .
[17] J. Filar,et al. Competitive Markov Decision Processes , 1996 .
[18] T. E. S. Raghavan,et al. Algorithms for stochastic games — A survey , 1991, ZOR Methods Model. Oper. Res..
[19] T. Basar,et al. H∞-0ptimal Control and Related Minimax Design Problems: A Dynamic Game Approach , 1996, IEEE Trans. Autom. Control..
[20] J. Neumann. Zur Theorie der Gesellschaftsspiele , 1928 .
[21] J. Nash. Equilibrium Points in N-Person Games. , 1950, Proceedings of the National Academy of Sciences of the United States of America.
[22] Quanyan Zhu,et al. Network Security Configurations: A Nonzero-Sum Stochastic Game Approach , 2010, Proceedings of the 2010 American Control Conference.
[23] Quanyan Zhu,et al. Deceptive routing games , 2012, 2012 IEEE 51st IEEE Conference on Decision and Control (CDC).
[24] Tansu Alpcan,et al. Network Security , 2010 .
[25] Kun Ji,et al. Resilient industrial control system (RICS): Concepts, formulation, metrics, and insights , 2010, 2010 3rd International Symposium on Resilient Control Systems.
[26] T. Başar. Minimax control of switching systems under sampling , 1994, Proceedings of 1994 33rd IEEE Conference on Decision and Control.
[27] Quanyan Zhu,et al. Deceptive Routing in Relay Networks , 2012, GameSec.
[28] T. Başar,et al. Dynamic Noncooperative Game Theory , 1982 .
[29] Samuel Greengard,et al. The new face of war , 2010, Commun. ACM.
[30] Quanyan Zhu,et al. Game-Theoretic Approach to Feedback-Driven Multi-stage Moving Target Defense , 2013, GameSec.
[31] Ron Johnson,et al. El comercio minorista no está en bancarrota, las tiendas sí , 2012 .
[32] T. Başar. Minimax control of switching systems under sampling , 1994, Proceedings of 1994 33rd IEEE Conference on Decision and Control.
[33] Quanyan Zhu,et al. A hierarchical security architecture for smart grid , 2010 .
[34] Quanyan Zhu,et al. Resilient control of cyber-physical systems against Denial-of-Service attacks , 2013, 2013 6th International Symposium on Resilient Control Systems (ISRCS).
[35] David I. Gertman,et al. Resilient control systems: Next generation design research , 2009, 2009 2nd Conference on Human System Interactions.
[36] Tamer Basar,et al. H infintity control of large-scale jump linear systems via averaging and aggregation , 1999 .
[37] Jim Kurose,et al. Computer Networking: A Top-Down Approach , 1999 .
[38] Quanyan Zhu,et al. Robust and resilient control design for cyber-physical systems with an application to power systems , 2011, IEEE Conference on Decision and Control and European Control Conference.
[39] Robert L. Wears,et al. Resilience Engineering: Concepts and Precepts , 2006, Quality and Safety in Health Care.
[40] Quanyan Zhu,et al. Management of Control System Information SecurityI: Control System Patch Management , 2011 .
[41] Quanyan Zhu,et al. Game theory meets network security and privacy , 2013, CSUR.
[42] Onésimo Hernández-Lerma,et al. Zero-Sum Stochastic Games in Borel Spaces: Average Payoff Criteria , 2000, SIAM J. Control. Optim..
[43] Marija D. Ilic,et al. From Hierarchical to Open Access Electric Power Systems , 2007, Proceedings of the IEEE.
[44] L. Shapley,et al. Stochastic Games* , 1953, Proceedings of the National Academy of Sciences.
[45] Miles A. McQueen,et al. Ideal Based Cyber Security Technical Metrics for Control Systems , 2007, CRITIS.
[46] Richard L. Tweedie,et al. Markov Chains and Stochastic Stability , 1993, Communications and Control Engineering Series.
[47] Erik Hollnagel,et al. Resilience Engineering in Practice: A Guidebook , 2012 .
[48] Quanyan Zhu,et al. Distributed strategic learning with application to network security , 2011, Proceedings of the 2011 American Control Conference.