A Dynamic Game Approach to Designing Secure Interdependent IoT-Enabled Infrastructure Network
暂无分享,去创建一个
[1] Quanyan Zhu,et al. Security as a Service for Cloud-Enabled Internet of Controlled Things Under Advanced Persistent Threats: A Contract Design Approach , 2017, IEEE Transactions on Information Forensics and Security.
[2] Liang Xiao,et al. IoT Security Techniques Based on Machine Learning: How Do IoT Devices Use AI to Enhance Security? , 2018, IEEE Signal Processing Magazine.
[3] Jonathan L. Gross,et al. Handbook of graph theory , 2007, Discrete mathematics and its applications.
[4] T. Lewis. Critical Infrastructure Protection in Homeland Security: Defending a Networked Nation , 2006 .
[5] Adrian Perrig,et al. Distributed detection of node replication attacks in sensor networks , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[6] Corinne Touati,et al. Optimal Design and Defense of Networks Under Link Attacks , 2017 .
[7] Quanyan Zhu,et al. Control of Multilayer Mobile Autonomous Systems in Adversarial Environments: A Games-in-Games Approach , 2019, IEEE Transactions on Control of Network Systems.
[8] J. Cynthia,et al. Hamilton Decomposition of Harary Graphs , 2016 .
[9] Geir M. Køien,et al. Cyber Security and the Internet of Things: Vulnerabilities, Threats, Intruders and Attacks , 2015, J. Cyber Secur. Mobil..
[10] Marimuthu Palaniswami,et al. Internet of Things (IoT): A vision, architectural elements, and future directions , 2012, Future Gener. Comput. Syst..
[11] Tansu Alpcan,et al. Network Security , 2010 .
[12] Niraj K. Jha,et al. A Comprehensive Study of Security of Internet-of-Things , 2017, IEEE Transactions on Emerging Topics in Computing.
[13] Quanyan Zhu,et al. Heterogeneous Multi-Layer Adversarial Network Design for the IoT-Enabled Infrastructures , 2017, GLOBECOM 2017 - 2017 IEEE Global Communications Conference.
[14] Marcin Dziubinski,et al. Network Design and Defence , 2012, Games Econ. Behav..
[15] Amitav Mukherjee,et al. Physical-Layer Security in the Internet of Things: Sensing and Communication Confidentiality Under Resource Constraints , 2015, Proceedings of the IEEE.
[16] Quanyan Zhu,et al. Interdependent Strategic Security Risk Management With Bounded Rationality in the Internet of Things , 2019, IEEE Transactions on Information Forensics and Security.
[17] Chuang Lin,et al. Stochastic game net and applications in security analysis for enterprise network , 2011, International Journal of Information Security.
[18] Mingyan Liu,et al. Designing Cyber Insurance Policies: The Role of Pre-Screening and Security Interdependence , 2018, IEEE Transactions on Information Forensics and Security.
[19] Gerald G. Brown,et al. Defending Critical Infrastructure , 2006, Interfaces.
[20] F. Harary. THE MAXIMUM CONNECTIVITY OF A GRAPH. , 1962, Proceedings of the National Academy of Sciences of the United States of America.
[21] Quanyan Zhu,et al. A Dynamic Game Approach to Strategic Design of Secure and Resilient Infrastructure Network , 2019, IEEE Transactions on Information Forensics and Security.
[22] Bruce Bueno de Mesquita,et al. An Introduction to Game Theory , 2014 .
[23] Yung-Hsiang Lu,et al. Cloud Computing for Mobile Users: Can Offloading Computation Save Energy? , 2010, Computer.
[24] Quanyan Zhu,et al. Optimal Secure Two-Layer IoT Network Design , 2017, IEEE Transactions on Control of Network Systems.
[25] Yuguang Fang,et al. Securing wireless sensor networks: a survey , 2008, IEEE Communications Surveys & Tutorials.
[26] Tansu Alpcan,et al. Stochastic games for security in networks with interdependent nodes , 2009, 2009 International Conference on Game Theory for Networks.
[27] ZhangRui,et al. A Bi-Level Game Approach to Attack-Aware Cyber Insurance of Computer Networks , 2017 .
[28] Lingkun Fu,et al. DoS Attack Energy Management Against Remote State Estimation , 2018, IEEE Transactions on Control of Network Systems.
[29] K. Menger. Zur allgemeinen Kurventheorie , 1927 .