暂无分享,去创建一个
Quanyan Zhu | Stefan Rass | Bernhard Dieber | Victor Mayoral Vilches | Quanyan Zhu | S. Rass | V. Vilches | Bernhard Dieber
[1] Quanyan Zhu,et al. Dynamic Resilient Network Games With Applications to Multiagent Consensus , 2020, IEEE Transactions on Control of Network Systems.
[2] Stefan Rass,et al. Can ROS be used securely in industry? Red teaming ROS-Industrial , 2020, ArXiv.
[3] Tuhin Sahai,et al. Post Quantum Secure Command and Control of Mobile Agents Inserting quantum-resistant encryption schemes in the Secure Robot Operating System , 2020, 2020 Fourth IEEE International Conference on Robotic Computing (IRC).
[4] E. Gil-Uriarte,et al. DevSecOps in Robotics , 2020, ArXiv.
[5] Quanyan Zhu,et al. Control of Multilayer Mobile Autonomous Systems in Adversarial Environments: A Games-in-Games Approach , 2019, IEEE Transactions on Control of Network Systems.
[6] Quanyan Zhu,et al. Dynamic games for secure and resilient control system design , 2019, National science review.
[7] Quanyan Zhu,et al. A Dynamic Game Approach to Strategic Design of Secure and Resilient Infrastructure Network , 2019, IEEE Transactions on Information Forensics and Security.
[8] Tao Zhang,et al. Game-Theoretic Analysis of Cyber Deception: Evidence-Based Strategies and Dynamic Risk Mitigation , 2019, ArXiv.
[9] Quanyan Zhu,et al. Optimal Secure Two-Layer IoT Network Design , 2017, IEEE Transactions on Control of Network Systems.
[10] Quanyan Zhu,et al. Cross-Layer Design for Secure and Resilient Cyber-Physical Systems: A Decision and Game Theoretic Approach , 2020, Advances in Information Security.
[11] Stefan Rass,et al. Security Games over Lexicographic Orders , 2020, GameSec.
[12] Quanyan Zhu,et al. MASAGE: Model-Agnostic Sequential and Adaptive Game Estimation , 2020, GameSec.
[13] Guanze Peng. A Data-Driven Distributionally Robust Game Using Wasserstein Distance , 2020, GameSec.
[14] Quanyan Zhu,et al. A Game- and Decision-Theoretic Approach to Resilient Interdependent Network Analysis and Design , 2020, SpringerBriefs in Electrical and Computer Engineering.
[15] Dan Gazebo Sebagai,et al. Robot Operating System (ROS) , 2020, Studies in Computational Intelligence.
[16] Stefan Rass,et al. Cut-The-Rope: A Game of Stealthy Intrusion , 2019, GameSec.
[17] Stefan Rass,et al. Honeypot Type Selection Games for Smart Grid Networks , 2019, GameSec.
[18] Quanyan Zhu,et al. Subgame Perfect Equilibrium Analysis for Jamming Attacks on Resilient Graphs , 2019, 2019 American Control Conference (ACC).
[19] Quanyan Zhu,et al. Adaptive Honeypot Engagement through Reinforcement Learning of Semi-Markov Decision Processes , 2019, GameSec.
[20] Quanyan Zhu,et al. Deceptive Reinforcement Learning Under Adversarial Manipulations on Cost Signals , 2019, GameSec.
[21] Bernhard Dieber,et al. Quantum Computation in Robotic Science and Applications , 2019, 2019 International Conference on Robotics and Automation (ICRA).
[22] Stefan Rass,et al. An Overview of Data Quality Frameworks , 2019, IEEE Access.
[23] Quanyan Zhu,et al. Community-Based Security for the Internet of Things , 2018, ArXiv.
[24] Quanyan Zhu,et al. Dynamic Bayesian Games for Adversarial and Defensive Cyber Deception , 2018, Autonomous Cyber Deception.
[25] Quanyan Zhu,et al. iSTRICT: An Interdependent Strategic Trust Mechanism for the Cloud-Enabled Internet of Controlled Things , 2018, IEEE Transactions on Information Forensics and Security.
[26] Quanyan Zhu,et al. Modeling and Analysis of Leaky Deception Using Signaling Games With Evidence , 2018, IEEE Transactions on Information Forensics and Security.
[27] Quanyan Zhu,et al. A Game-theoretic Taxonomy and Survey of Defensive Deception for Cybersecurity and Privacy , 2017, ACM Comput. Surv..
[28] Stefan Rass,et al. Refining Stochastic Models of Critical Infrastructures by Observation , 2019 .
[29] Bernhard Dieber,et al. Case study: Remote attack to disable MiR100 safety , 2019 .
[30] Industrial Control Systems Security and Resiliency: Practice and Theory , 2019, Advances in Information Security.
[31] Agostino Cortesi,et al. Penetration Testing ROS , 2019, Studies in Computational Intelligence.
[32] Branislav Bosanský,et al. An Initial Study of Targeted Personality Models in the FlipIt Game , 2018, GameSec.
[33] Stefan Rass,et al. Disappointment-Aversion in Security Games , 2018, GameSec.
[34] Nirupama Bulusu,et al. Towards True Decentralization: A Blockchain Consensus Protocol Based on Game Theory and Randomness , 2018, GameSec.
[35] Quanyan Zhu,et al. Analysis and Computation of Adaptive Defense Strategies Against Advanced Persistent Threats for Cyber-Physical Systems , 2018, GameSec.
[36] Stefan Rass,et al. Perfectly Secure Communication, based on Graph-Topological Addressing in Unique-Neighborhood Networks , 2018, ArXiv.
[37] Quanyan Zhu,et al. DISTRIBUTED AND OPTIMAL RESILIENT PLANNING OF LARGE-SCALE INTERDEPENDENT CRITICAL INFRASTRUCTURES , 2018, 2018 Winter Simulation Conference (WSC).
[38] George Loukas,et al. A taxonomy of cyber-physical threats and impact in the smart home , 2018, Comput. Secur..
[39] Quanyan Zhu,et al. Cross-Layer Secure and Resilient Control of Delay-Sensitive Networked Robot Operating Systems , 2018, 2018 IEEE Conference on Control Technology and Applications (CCTA).
[40] Gorka Olalde Mendia,et al. Towards an open standard for assessing the severity of robot security vulnerabilities, the Robot Vulnerability Scoring System (RVSS) , 2018, ArXiv.
[41] Sandra König,et al. Assessing the Impact of Malware Attacks in Utility Networks , 2018 .
[42] Erik Tews,et al. Introducing the Robot Security Framework (RSF), a standardized methodology to perform security assessments in robotics , 2018, ArXiv.
[43] Stefan Rass,et al. Password Security as a Game of Entropies , 2018, Entropy.
[44] Quanyan Zhu,et al. On Multi-Phase and Multi-Stage Game-Theoretic Modeling of Advanced Persistent Threats , 2018, IEEE Access.
[45] Quanyan Zhu,et al. A Game-Theoretic Approach to Design Secure and Resilient Distributed Support Vector Machines , 2018, IEEE Transactions on Neural Networks and Learning Systems.
[46] Stefan Rass,et al. Security Strategies and Multi-Criteria Decision Making , 2018 .
[47] Vicente Matellán Olivera,et al. Cybersecurity of Robotics and Autonomous Systems: Privacy and Safety , 2017 .
[48] Peter Schartner,et al. Security for the Robot Operating System , 2017, Robotics Auton. Syst..
[49] Quanyan Zhu,et al. A game-theoretic defense against data poisoning attacks in distributed support vector machines , 2017, 2017 IEEE 56th Annual Conference on Decision and Control (CDC).
[50] Stefan Rass,et al. On the Cost of Game Playing: How to Control the Expenses in Mixed Strategies , 2017, GameSec.
[51] Quanyan Zhu,et al. A Large-Scale Markov Game Approach to Dynamic Protection of Interdependent Infrastructure Networks , 2017, GameSec.
[52] Quanyan Zhu,et al. Secure and practical output feedback control for cloud-enabled cyber-physical systems , 2017, 2017 IEEE Conference on Communications and Network Security (CNS).
[53] Quanyan Zhu,et al. Strategic Trust in Cloud-Enabled Cyber-Physical Systems With an Application to Glucose Control , 2017, IEEE Transactions on Information Forensics and Security.
[54] Quanyan Zhu,et al. Interdependent strategic cyber defense and robust switching control design for wind energy systems , 2017, 2017 IEEE Power & Energy Society General Meeting.
[55] Quanyan Zhu,et al. Heterogeneous Multi-Layer Adversarial Network Design for the IoT-Enabled Infrastructures , 2017, GLOBECOM 2017 - 2017 IEEE Global Communications Conference.
[56] Quanyan Zhu,et al. A Game-Theoretic Approach to Secure Control of Communication-Based Train Control Systems Under Jamming Attacks , 2017, SCAV@CPSWeek.
[57] Rui Zhang,et al. A game-theoretic analysis of label flipping attacks on distributed support vector machines , 2017, 2017 51st Annual Conference on Information Sciences and Systems (CISS).
[58] Quanyan Zhu,et al. Phishing for Phools in the Internet of Things: Modeling One-to-Many Deception using Poisson Signaling Games , 2017, ArXiv.
[59] Quanyan Zhu,et al. A Bi-Level Game Approach to Attack-Aware Cyber Insurance of Computer Networks , 2017, IEEE Journal on Selected Areas in Communications.
[60] Stefan Rass,et al. Defending Against Advanced Persistent Threats Using Game-Theory , 2017, PloS one.
[61] D. Bernstein,et al. Post-quantum cryptography , 2008, Nature.
[62] S. Rass,et al. Visual Risk Specification and Aggregation , 2017 .
[63] Quanyan Zhu,et al. Dynamic Differential Privacy for ADMM-Based Distributed Classification Learning , 2017, IEEE Transactions on Information Forensics and Security.
[64] Quanyan Zhu,et al. On solving large-scale low-rank zero-sum security games of incomplete information , 2016, 2016 IEEE International Workshop on Information Forensics and Security (WIFS).
[65] Quanyan Zhu,et al. GADAPT: A Sequential Game-Theoretic Framework for Designing Defense-in-Depth Strategies Against Advanced Persistent Threats , 2016, GameSec.
[66] Quanyan Zhu,et al. Optimal Contract Design Under Asymmetric Information for Cloud-Enabled Internet of Controlled Things , 2016, GameSec.
[67] William H. Sanders,et al. A Game-Theoretic Approach to Respond to Attacker Lateral Movement , 2016, GameSec.
[68] Jakob Jonsson,et al. PKCS #1: RSA Cryptography Specifications Version 2.2 , 2016, RFC.
[69] Rui Zhang,et al. Attack-Aware Cyber Insurance of Interdependent Computer Networks , 2016 .
[70] Quanyan Zhu,et al. Compliance signaling games: toward modeling the deterrence of insider threats , 2016, Comput. Math. Organ. Theory.
[71] Quanyan Zhu,et al. Cross-layer secure cyber-physical control system design for networked 3D printers , 2016, 2016 American Control Conference (ACC).
[72] Quanyan Zhu,et al. Interdependent network formation games with an application to critical infrastructures , 2016, 2016 American Control Conference (ACC).
[73] Quanyan Zhu,et al. A Stackelberg game perspective on the conflict between machine learning and data obfuscation , 2016, 2016 IEEE International Workshop on Information Forensics and Security (WIFS).
[74] Tony Q. S. Quek,et al. A game theoretic model for enabling honeypots in IoT networks , 2016, 2016 IEEE International Conference on Communications (ICC).
[75] Quanyan Zhu,et al. Interdependent Network Formation Games , 2016, ArXiv.
[76] Quanyan Zhu,et al. Resilient and decentralized control of multi-level cooperative mobile networks to maintain connectivity under adversarial environment , 2015, 2016 IEEE 55th Conference on Decision and Control (CDC).
[77] Kristian Weium Lange,et al. Cybersecurity in the Internet of Things , 2016 .
[78] Sushil Jajodia,et al. Cyber Deception , 2016, Springer International Publishing.
[79] Quanyan Zhu,et al. To Trust or Not: A Security Signaling Game Between Service Provider and Client , 2015, GameSec.
[80] Quanyan Zhu,et al. Attack-Aware Cyber Insurance for Risk Sharing in Computer Networks , 2015, GameSec.
[81] Quanyan Zhu,et al. Secure and Resilient Control Design for Cloud Enabled Networked Control Systems , 2015, CPS-SPC '15.
[82] Rui Zhang,et al. Secure and resilient distributed machine learning under adversarial environments , 2015, 2015 18th International Conference on Information Fusion (Fusion).
[83] Quanyan Zhu,et al. Flip the Cloud: Cyber-Physical Signaling Games in the Presence of Advanced Persistent Threats , 2015, GameSec.
[84] Karen A. Scarfone,et al. Guide to Industrial Control Systems (ICS) Security , 2015 .
[85] Quanyan Zhu,et al. Deception by Design: Evidence-Based Signaling Games for Network Defense , 2015, WEIS.
[86] Quanyan Zhu,et al. A cyber-physical game framework for secure and resilient multi-agent autonomous systems , 2015, 2015 54th IEEE Conference on Decision and Control (CDC).
[87] Quanyan Zhu,et al. Game-Theoretic Methods for Robustness, Security, and Resilience of Cyberphysical Control Systems: Games-in-Games Principle for Optimal Cross-Layer Resilient Control Systems , 2015, IEEE Control Systems.
[88] Pieter Abbeel,et al. Image Object Label 3 D CAD Model Candidate Grasps Google Object Recognition Engine Google Cloud Storage Select Feasible Grasp with Highest Success Probability Pose EstimationCamera Robots Cloud 3 D Sensor , 2014 .
[89] Quanyan Zhu,et al. Hierarchical architectures of resilient control systems: Concepts, metrics and design principles , 2015 .
[90] Quanyan Zhu,et al. A moving-horizon hybrid stochastic game for secure control of cyber-physical systems , 2014, 53rd IEEE Conference on Decision and Control.
[91] Quanyan Zhu,et al. A Dynamic Bayesian Security Game Framework for Strategic Defense Mechanism Design , 2014, GameSec.
[92] Stefan Rass,et al. Numerical Computation of Multi-goal Security Strategies , 2014, GameSec.
[93] Stefan Rass,et al. Secure Communication over Software-Defined Networks , 2015, Mob. Networks Appl..
[94] Stefan Rass. Complexity of Network Design for Private Communication and the P-vs-NP Question , 2014 .
[95] Ehab Al-Shaer,et al. A game-theoretic approach for deceiving Remote Operating System Fingerprinting , 2013, 2013 IEEE Conference on Communications and Network Security (CNS).
[96] Quanyan Zhu,et al. Game-Theoretic Approach to Feedback-Driven Multi-stage Moving Target Defense , 2013, GameSec.
[97] Thomas Pornin. Deterministic Usage of the Digital Signature Algorithm (DSA) and Elliptic Curve Digital Signature Algorithm (ECDSA) , 2013, RFC.
[98] Quanyan Zhu,et al. An impact-aware defense against Stuxnet , 2013, 2013 American Control Conference.
[99] Quanyan Zhu,et al. Game theory meets network security and privacy , 2013, CSUR.
[100] David Mascareñas,et al. A preliminary cyber-physical security assessment of the Robot Operating System (ROS) , 2013, Defense, Security, and Sensing.
[101] Stefan Rass,et al. A Network Modeling and Analysis Tool for Perfectly Secure Communication , 2013, 2013 IEEE 27th International Conference on Advanced Information Networking and Applications (AINA).
[102] Stefan Rass,et al. On Bayesian Trust and Risk Forecasting for Compound Systems , 2013, 2013 Seventh International Conference on IT Security Incident Management and IT Forensics.
[103] Quanyan Zhu,et al. Hybrid Learning in Stochastic Games and Its Application in Network Security , 2013 .
[104] Quanyan Zhu,et al. Resilient Distributed Control of Multi-agent Cyber-Physical Systems , 2013, CPSW@CISS.
[105] Frank L. Lewis,et al. Reinforcement Learning and Approximate Dynamic Programming for Feedback Control , 2012 .
[106] Thierry Chauveau,et al. Subjective risk and disappointment , 2012 .
[107] Quanyan Zhu,et al. Deceptive Routing in Relay Networks , 2012, GameSec.
[108] Ronald L. Rivest,et al. FlipIt: The Game of “Stealthy Takeover” , 2012, Journal of Cryptology.
[109] Quanyan Zhu,et al. Agent-based cyber control strategy design for resilient control systems: Concepts, architecture and methodologies , 2012, 2012 5th International Symposium on Resilient Control Systems.
[110] Quanyan Zhu,et al. A dynamic game-theoretic approach to resilient control system design for cascading failures , 2012, HiCoNS '12.
[111] P. Cochat,et al. Et al , 2008, Archives de pediatrie : organe officiel de la Societe francaise de pediatrie.
[112] Quanyan Zhu,et al. Dynamic Secure Routing Game in Distributed Cognitive Radio Networks , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.
[113] Quanyan Zhu,et al. Robust and resilient control design for cyber-physical systems with an application to power systems , 2011, IEEE Conference on Decision and Control and European Control Conference.
[114] Walid Saad,et al. Eavesdropping and jamming in next-generation wireless networks: A game-theoretic approach , 2011, 2011 - MILCOM 2011 Military Communications Conference.
[115] Quanyan Zhu,et al. Indices of Power in Optimal IDS Default Configuration: Theory and Examples , 2011, GameSec.
[116] Sushil Jajodia,et al. Moving Target Defense - Creating Asymmetric Uncertainty for Cyber Threats , 2011, Moving Target Defense.
[117] Quanyan Zhu,et al. A hierarchical security architecture for cyber-physical systems , 2011, 2011 4th International Symposium on Resilient Control Systems.
[118] Blaine Nelson,et al. Adversarial machine learning , 2019, AISec '11.
[119] Quanyan Zhu,et al. Distributed strategic learning with application to network security , 2011, Proceedings of the 2011 American Control Conference.
[120] Anoop Singhal,et al. Security Risk Analysis of Enterprise Networks Using Probabilistic Attack Graphs , 2011 .
[121] Donald E. Eastlake,et al. US Secure Hash Algorithms (SHA and SHA-based HMAC and HKDF) , 2011, RFC.
[122] Quanyan Zhu,et al. Heterogeneous learning in zero-sum stochastic games with incomplete information , 2011, 49th IEEE Conference on Decision and Control (CDC).
[123] Quanyan Zhu,et al. Network Security Configurations: A Nonzero-Sum Stochastic Game Approach , 2010, Proceedings of the 2010 American Control Conference.
[124] Peter Schartner,et al. Multipath Authentication without shared Secrets and with Applications in Quantum Networks , 2010, Security and Management.
[125] Oguzhan Alagöz,et al. Modeling secrecy and deception in a multiple-period attacker-defender signaling game , 2010, Eur. J. Oper. Res..
[126] Quanyan Zhu,et al. No-Regret Learning in Collaborative Spectrum Sensing with Malicious Nodes , 2010, 2010 IEEE International Conference on Communications.
[127] Quanyan Zhu,et al. A Stochastic Game Model for Jamming in Multi-Channel Cognitive Radio Systems , 2010, 2010 IEEE International Conference on Communications.
[128] Quanyan Zhu,et al. Distributed correlated Q-learning for dynamic transmission control of sensor networks , 2010, 2010 IEEE International Conference on Acoustics, Speech and Signal Processing.
[129] Quanyan Zhu,et al. Dynamic policy-based IDS configuration , 2009, Proceedings of the 48h IEEE Conference on Decision and Control (CDC) held jointly with 2009 28th Chinese Control Conference.
[130] Daniel Grosu,et al. A Game Theoretic Investigation of Deception in Network Security , 2009, 2009 Proceedings of 18th International Conference on Computer Communications and Networks.
[131] Siv Hilde Houmb,et al. Estimating ToE Risk Level Using CVSS , 2009, 2009 International Conference on Availability, Reliability and Security.
[132] Marc Lelarge,et al. Cyber Insurance as an Incentivefor Internet Security , 2009, Managing Information Risk and the Economics of Security.
[133] Morgan Quigley,et al. ROS: an open-source Robot Operating System , 2009, ICRA 2009.
[134] Qishi Wu,et al. AVOIDIT: A Cyber Attack Taxonomy , 2009 .
[135] Abhijit Choudhury,et al. AES Galois Counter Mode (GCM) Cipher Suites for TLS , 2008, RFC.
[136] Nicholas Bambos,et al. Security Decision-Making among Interdependent Organizations , 2008, 2008 21st IEEE Computer Security Foundations Symposium.
[137] Iyatiti Mokube,et al. Honeypots: concepts, approaches, and challenges , 2007, ACM-SE 45.
[138] Donald E. Eastlake,et al. US Secure Hash Algorithms (SHA and HMAC-SHA) , 2006, RFC.
[139] Roy T. Fielding,et al. Uniform Resource Identifier (URI): Generic Syntax , 2005, RFC.
[140] T. Basar,et al. A game theoretic analysis of intrusion detection in access control systems , 2004, 2004 43rd IEEE Conference on Decision and Control (CDC) (IEEE Cat. No.04CH37601).
[141] Uri Blumenthal,et al. The Advanced Encryption Standard (AES) Cipher Algorithm in the SNMP User-based Security Model , 2004, RFC.
[142] I. V. Konnov. On Lexicographic Vector Equilibrium Problems , 2003 .
[143] Audun Jøsang,et al. AIS Electronic Library (AISeL) , 2017 .
[144] Peter W. Shor,et al. Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer , 1995, SIAM Rev..
[145] John T. Kohl,et al. The Kerberos Network Authentication Service (V5 , 2004 .
[146] R. Gibbons. Game theory for applied economists , 1992 .
[147] Faruk Gul. A Theory of Disappointment Aversion , 1991 .
[148] Tamer Basar,et al. With the Capacity 0.461(bits) and the Optimal Opd Being 'q = , 1998 .
[149] T. Başar,et al. Dynamic Noncooperative Game Theory , 1982 .
[150] J. Nash. Equilibrium Points in N-Person Games. , 1950, Proceedings of the National Academy of Sciences of the United States of America.