Hypergames and Cyber-Physical Security for Control Systems
暂无分享,去创建一个
Draguna Vrabie | Arnab Bhattacharya | Samrat Chatterjee | Craig Bakker | D. Vrabie | Arnab Bhattacharya | Craig Bakker | S. Chatterjee
[1] Kyoichi Kijima,et al. Hierarchical hypergames and Bayesian games: A generalization of the theoretical comparison of hypergames and Bayesian games considering hierarchy of perceptions , 2016, J. Syst. Sci. Complex..
[2] Bahman Gharesifard,et al. Exploration of misperceptions in hypergames , 2011, 2011 49th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[3] Dorothy E. Denning. Stuxnet: What Has Changed? , 2012, Future Internet.
[4] A. McKinnon,et al. Hypergame analysis of the stability of relationships between computerbased logistics systems , 1992 .
[5] R. McKelvey,et al. Quantal Response Equilibria for Normal Form Games , 1995 .
[6] Bahman Gharesifard,et al. Evolution of the perception about the opponent in hypergames , 2010, 49th IEEE Conference on Decision and Control (CDC).
[7] Ralph Langner. To Kill a Centrifuge A Technical Analysis of What Stuxnet ’ s Creators Tried to Achieve , 2013 .
[8] Victor R. Lesser,et al. Coalitions Among Computationally Bounded Agents , 1997, Artif. Intell..
[9] Mordechai Guri,et al. HVACKer: Bridging the Air-Gap by Attacking the Air Conditioning System , 2017, ArXiv.
[10] T. Sandler,et al. Terrorism & Game Theory , 2003 .
[11] Thomas M. Chen,et al. Lessons from Stuxnet , 2011, Computer.
[12] D. Stahl,et al. On Players' Models of Other Players: Theory and Experimental Evidence , 1995 .
[13] Keith W. Hipel,et al. Hypergame Analysis of the Lake Biwa Conflict , 1985 .
[14] Stamatis Karnouskos,et al. Stuxnet worm impact on industrial cyber-physical system security , 2011, IECON 2011 - 37th Annual Conference of the IEEE Industrial Electronics Society.
[15] Jon R. Lindsay,et al. Stuxnet and the Limits of Cyber Warfare , 2013 .
[16] H. K. Verma,et al. Design and Development of Wired Building Automation Systems , 2015 .
[17] Craig Boutilier,et al. Economic Principles of Multi-Agent Systems , 1997, Artif. Intell..
[18] Mohammed H. Almeshekah,et al. Modeling deception in information security as a hypergame: a primer , 2015 .
[19] Wolfgang Kastner,et al. Communication systems for building automation and control , 2005, Proceedings of the IEEE.
[20] Bruce M. McMillin,et al. A Modal Model of Stuxnet Attacks on Cyber-physical Systems: A Matter of Trust , 2014, 2014 Eighth International Conference on Software Security and Reliability.
[21] Levente Buttyán,et al. The Cousins of Stuxnet: Duqu, Flame, and Gauss , 2012, Future Internet.
[22] Arnab Bhattacharya,et al. Learning and Information Manipulation: Repeated Hypergames for Cyber-Physical Security , 2020, IEEE Control Systems Letters.
[23] Yasuo Sasaki. Preservation of Misperceptions – Stability Analysis of Hypergames , 2008 .
[24] Lillykutty Jacob,et al. Energy efficient wireless networked Building Automation System controlled by real occupancy , 2015, TENCON 2015 - 2015 IEEE Region 10 Conference.
[25] Tatsushi Yamasaki,et al. Replicator dynamics of evolutionary hypergames , 2003, SMC'03 Conference Proceedings. 2003 IEEE International Conference on Systems, Man and Cybernetics. Conference Theme - System Security and Assurance (Cat. No.03CH37483).
[26] George Cybenko,et al. Hypergame theory applied to cyber attack and defense , 2010, Defense + Commercial Sensing.
[27] B. Hobbs,et al. A tutorial review of complementarity models for decision-making in energy markets , 2014 .
[28] Gary B. Lamont,et al. Hypergame Theory: A Model for Conflict, Misperception, and Deception , 2015 .
[29] Kyoichi Kijima,et al. Hypergames and bayesian games: A theoretical comparison of the models of games with incomplete information , 2012, J. Syst. Sci. Complex..
[30] A. Tversky,et al. Prospect theory: analysis of decision under risk , 1979 .
[31] A. Roth. The Economist as Engineer: Game Theory, Experimentation, and Computation as Tools for Design Economics , 2002 .
[32] Takehiro Inohara,et al. Evolutionary approach to three-person hypergame situation , 1999, IEEE SMC'99 Conference Proceedings. 1999 IEEE International Conference on Systems, Man, and Cybernetics (Cat. No.99CH37028).
[33] Colin Camerer,et al. A Cognitive Hierarchy Model of Games , 2004 .
[34] Peter G. Bennett,et al. Hypergames: Developing a model of conflict☆ , 1980 .
[35] J. Sákovics. Games of Incomplete Information Without Common Knowledge Priors , 2001 .
[36] Stuart E. Madnick,et al. A Systems Theoretic Approach to the Security Threats in Cyber Physical Systems Applied to Stuxnet , 2018, IEEE Transactions on Dependable and Secure Computing.
[37] Wu Qiuxuan,et al. Study on monitor system of heating ventilation air conditioning based on LonWorks technology , 2009 .
[38] A. Tversky,et al. Prospect theory: an analysis of decision under risk — Source link , 2007 .
[39] Alexander G. Chkhartishvili,et al. Reflexion and Control: Mathematical Models , 2014 .
[40] Ralph Langner,et al. Stuxnet: Dissecting a Cyberwarfare Weapon , 2011, IEEE Security & Privacy.