暂无分享,去创建一个
[1] Fuzhen Zhang. The Schur complement and its applications , 2005 .
[2] W. Marsden. I and J , 2012 .
[3] Bruno Sinopoli,et al. Detecting Integrity Attacks on SCADA Systems , 2014, IEEE Transactions on Control Systems Technology.
[4] Quanyan Zhu,et al. Game-Theoretic Methods for Robustness, Security, and Resilience of Cyberphysical Control Systems: Games-in-Games Principle for Optimal Cross-Layer Resilient Control Systems , 2015, IEEE Control Systems.
[5] L. Shepp. Probability Essentials , 2002 .
[6] C. A. Cooper,et al. An optimal stochastic control problem with observation cost , 1971 .
[7] Branislav Bosanský,et al. Manipulating Adversary's Belief: A Dynamic Game Approach to Deception by Design for Proactive Network Security , 2017, GameSec.
[8] Quanyan Zhu,et al. Physical Intrusion Games—Optimizing Surveillance by Simulation and Game Theory , 2017, IEEE Access.
[9] William H. Sanders,et al. A Game-Theoretic Approach to Respond to Attacker Lateral Movement , 2016, GameSec.
[10] John N. Tsitsiklis,et al. Neuro-Dynamic Programming , 1996, Encyclopedia of Machine Learning.
[11] Pietro Tesi,et al. Networked Control Under DoS Attacks: Tradeoffs Between Resilience and Data Rate , 2021, IEEE Transactions on Automatic Control.
[12] Ling Shi,et al. Optimal DoS Attack Scheduling in Wireless Networked Control System , 2016, IEEE Transactions on Control Systems Technology.
[13] Neil Genzlinger. A. and Q , 2006 .
[14] Michael P. Wellman,et al. Multi-Stage Attack Graph Security Games: Heuristic Strategies, with Empirical Game-Theoretic Analysis , 2017, MTD@CCS.
[15] Quanyan Zhu,et al. Continuous-Time Markov Decision Processes with Controlled Observations , 2019, 2019 57th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[16] Aaas News,et al. Book Reviews , 1893, Buffalo Medical and Surgical Journal.
[17] Quanyan Zhu,et al. A Game-Theoretic Approach to Secure Control of Communication-Based Train Control Systems Under Jamming Attacks , 2017, SCAV@CPSWeek.
[18] T. Başar,et al. Dynamic Noncooperative Game Theory , 1982 .
[19] Warren E. Dixon,et al. Detection and Mitigation of False Data Injection Attacks in Networked Control Systems , 2020, IEEE Transactions on Industrial Informatics.
[20] Sonia Martínez,et al. On the Performance Analysis of Resilient Networked Control Systems Under Replay Attacks , 2013, IEEE Transactions on Automatic Control.
[21] Sonia Martínez,et al. On event-triggered control of linear systems under periodic denial-of-service jamming attacks , 2012, 2012 IEEE 51st IEEE Conference on Decision and Control (CDC).
[22] Quanyan Zhu,et al. Dynamic games for secure and resilient control system design , 2019, National science review.
[23] Quanyan Zhu,et al. Adaptive Strategic Cyber Defense for Advanced Persistent Threats in Critical Infrastructure Networks , 2018, PERV.
[24] T. Başar,et al. A New Approach to Linear Filtering and Prediction Problems , 2001 .
[25] Quanyan Zhu,et al. On Multi-Phase and Multi-Stage Game-Theoretic Modeling of Advanced Persistent Threats , 2018, IEEE Access.
[26] Tamer Basar,et al. Optimal control in the presence of an intelligent jammer with limited actions , 2010, 49th IEEE Conference on Decision and Control (CDC).
[27] Quanyan Zhu,et al. Control of Multilayer Mobile Autonomous Systems in Adversarial Environments: A Games-in-Games Approach , 2019, IEEE Transactions on Control of Network Systems.