Asymptotic Security of Control Systems by Covert Reaction: Repeated Signaling Game with Undisclosed Belief
暂无分享,去创建一个
[1] Karl Henrik Johansson,et al. Secure Control Systems: A Quantitative Risk Management Approach , 2015, IEEE Control Systems.
[2] Tilman Börgers,et al. An introduction to the theory of mechanism design , 2015 .
[3] Henrik Sandberg,et al. Security analysis of control system anomaly detectors , 2017, 2017 American Control Conference (ACC).
[4] Todd E. Humphreys,et al. Drone Hack: Spoofing Attack Demonstration on a Civilian Unmanned Aerial Vehicle , 2012 .
[5] Jaspreet Kaur,et al. Covert channel-internal control protocols: attacks and defense , 2016, Secur. Commun. Networks.
[6] Achilleas Anastasopoulos,et al. Linear Equilibria for Dynamic LQG Games with Asymmetric Information and Dependent Types , 2019, 2019 IEEE 58th Conference on Decision and Control (CDC).
[7] Butler W. Lampson,et al. A note on the confinement problem , 1973, CACM.
[8] Karl Henrik Johansson,et al. Analysis and Mitigation of Bias Injection Attacks Against a Kalman Filter , 2017 .
[9] Francesco Bullo,et al. Control-Theoretic Methods for Cyberphysical Security: Geometric Principles for Optimal Cross-Layer Resilient Control Systems , 2015, IEEE Control Systems.
[10] Quanyan Zhu,et al. Modeling and Analysis of Leaky Deception Using Signaling Games With Evidence , 2018, IEEE Transactions on Information Forensics and Security.
[11] Thomas M. Cover,et al. Elements of Information Theory , 2005 .
[12] Tamer Basar,et al. Common Information based Markov Perfect Equilibria for Linear-Gaussian Games with Asymmetric Information , 2014, SIAM J. Control. Optim..
[13] Tamer Basar,et al. Common Information Based Markov Perfect Equilibria for Stochastic Games With Asymmetric Information: Finite Games , 2014, IEEE Transactions on Automatic Control.
[14] Vijay Gupta,et al. Data-injection attacks in stochastic control systems: Detectability and performance tradeoffs , 2017, Autom..
[15] Ayça Kaya,et al. Repeated signaling games , 2009, Games Econ. Behav..
[16] Sebastian Zander,et al. A survey of covert channels and countermeasures in computer network protocols , 2007, IEEE Communications Surveys & Tutorials.
[17] Soummya Kar,et al. Optimal Attack Strategies Subject to Detection Constraints Against Cyber-Physical Systems , 2016, IEEE Transactions on Control of Network Systems.
[18] Ron J. Patton,et al. Input Observability and Input Reconstruction , 1998, Autom..
[19] Roy S. Smith,et al. Covert Misappropriation of Networked Control Systems: Presenting a Feedback Structure , 2015, IEEE Control Systems.
[20] Harold L. Cole,et al. Dynamic Games with Hidden Actions and Hidden States , 2001, J. Econ. Theory.
[21] J. Sobel,et al. STRATEGIC INFORMATION TRANSMISSION , 1982 .
[22] Bruno Sinopoli,et al. On the Performance Degradation of Cyber-Physical Systems Under Stealthy Integrity Attacks , 2016, IEEE Transactions on Automatic Control.
[23] Ling Shi,et al. Worst-case stealthy innovation-based linear attack on remote state estimation , 2018, Autom..
[24] Achilleas Anastasopoulos,et al. A systematic process for evaluating structured perfect Bayesian equilibria in dynamic games with asymmetric information , 2015, 2016 American Control Conference (ACC).
[25] D. Kushner,et al. The real story of stuxnet , 2013, IEEE Spectrum.
[26] Akira Okada. Perfect Bayesian Equilibrium and Sequential Equilibrium , 2011 .
[27] David M. Kreps,et al. S I G N a L L I N G , 2022 .
[28] S. Zamir,et al. Formulation of Bayesian analysis for games with incomplete information , 1985 .
[29] Karl Henrik Johansson,et al. Estimating the Impact of Cyber-Attack Strategies for Stochastic Networked Control Systems , 2018, IEEE Transactions on Control of Network Systems.