[1]
|
Cooperative Transmission Strategy for Industrial IoT Against Interference Attacks
2023 IEEE Texas Power and Energy Conference (TPEC),
2023
DOI:10.1109/TPEC56611.2023.10078488
|
|
|
[2]
|
Coordinated Security Measures for Industrial IoT Against Eavesdropping
2023 IEEE Texas Power and Energy Conference (TPEC),
2023
DOI:10.1109/TPEC56611.2023.10078577
|
|
|
[3]
|
Cooperative Transmission Strategy for Industrial IoT Against Interference Attacks
2023 IEEE Texas Power and Energy Conference (TPEC),
2023
DOI:10.1109/TPEC56611.2023.10078488
|
|
|
[4]
|
Coordinated Security Measures for Industrial IoT Against Eavesdropping
2023 IEEE Texas Power and Energy Conference (TPEC),
2023
DOI:10.1109/TPEC56611.2023.10078577
|
|
|
[5]
|
A Physical-Layer Security Approach for IoT Against Jamming Interference Attacks
2021 IEEE Canadian Conference on Electrical and Computer Engineering (CCECE),
2021
DOI:10.1109/CCECE53047.2021.9569143
|
|
|
[6]
|
Advances in Computers,
2019
DOI:10.1016/bs.adcom.2019.02.003
|
|
|
[7]
|
Dynamic Games in Cyber-Physical Security: An Overview
Dynamic Games and Applications,
2019
DOI:10.1007/s13235-018-00291-y
|
|
|
[8]
|
Guide to Automotive Connectivity and Cybersecurity
Computer Communications and Networks,
2019
DOI:10.1007/978-3-319-73512-2_6
|
|
|
[9]
|
How Shall We Play a Game?: A Game-theoretical Model for Cyber-warfare Games
2017 IEEE 30th Computer Security Foundations Symposium (CSF),
2017
DOI:10.1109/CSF.2017.34
|
|
|
[10]
|
HackAttack
Proceedings of the 11th Annual Cyber and Information Security Research Conference,
2016
DOI:10.1145/2897795.2897801
|
|
|
[11]
|
Cyber‐Risk Informatics
2016
DOI:10.1002/9781119087540.ch5
|
|
|
[12]
|
HackAttack
Proceedings of the 11th Annual Cyber and Information Security Research Conference on - CISRC '16,
2016
DOI:10.1145/2897795.2897801
|
|
|
[13]
|
Cyber-Risk Informatics
2016
DOI:10.1002/9781119087540.ch5
|
|
|
[14]
|
Propagating mixed uncertainties in cyber attacker payoffs: Exploration of two-phase Monte Carlo sampling and probability bounds analysis
2016 IEEE Symposium on Technologies for Homeland Security (HST),
2016
DOI:10.1109/THS.2016.7568967
|
|
|
[15]
|
A Survey of Game Theoretic Approaches to Modelling Decision-Making in Information Warfare Scenarios
Future Internet,
2016
DOI:10.3390/fi8030034
|
|
|
[16]
|
A multiresolution approach for optimal defense against random attacks
International Journal of Information Security,
2015
DOI:10.1007/s10207-014-0245-x
|
|
|
[17]
|
Optimization of rootkit revealing system resources – A game theoretic approach
Journal of King Saud University - Computer and Information Sciences,
2015
DOI:10.1016/j.jksuci.2014.10.004
|
|
|
[18]
|
Quantifying mixed uncertainties in cyber attacker payoffs
2015 IEEE International Symposium on Technologies for Homeland Security (HST),
2015
DOI:10.1109/THS.2015.7225287
|
|
|
[19]
|
A game-theory analysis of the rat-group attack in smart grids
2014 IEEE Ninth International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP),
2014
DOI:10.1109/ISSNIP.2014.6827636
|
|
|
[20]
|
Reinforcement Learning Algorithms for Adaptive Cyber Defense against Heartbleed
Proceedings of the First ACM Workshop on Moving Target Defense - MTD '14,
2014
DOI:10.1145/2663474.2663481
|
|
|
[21]
|
A Model-Based Validated Autonomic Approach to Self-Protect Computing Systems
IEEE Internet of Things Journal,
2014
DOI:10.1109/JIOT.2014.2349899
|
|
|
[22]
|
Crisis Management
2014
DOI:10.4018/978-1-4666-4707-7.ch080
|
|
|
[23]
|
Reinforcement Learning Algorithms for Adaptive Cyber Defense against Heartbleed
Proceedings of the First ACM Workshop on Moving Target Defense,
2014
DOI:10.1145/2663474.2663481
|
|
|
[24]
|
Game Theory and Information Security
Applied Mechanics and Materials,
2013
DOI:10.4028/www.scientific.net/AMM.446-447.1625
|
|
|
[25]
|
Game Theory for Network Security
IEEE Communications Surveys & Tutorials,
2013
DOI:10.1109/SURV.2012.062612.00056
|
|
|
[26]
|
Vulnerability assessment of a food supply chain to an intentional attack
2012 IEEE Conference on Technologies for Homeland Security (HST),
2012
DOI:10.1109/THS.2012.6459868
|
|
|
[27]
|
Game-theoretic computing in risk analysis
Wiley Interdisciplinary Reviews: Computational Statistics,
2012
DOI:10.1002/wics.1205
|
|
|
[28]
|
Situational Awareness in Computer Network Defense
2012
DOI:10.4018/978-1-4666-0104-8.ch004
|
|
|
[29]
|
Decision Support Using Deterministic Equivalents of Probabilistic Game Trees
2012 IEEE 19th International Conference and Workshops on Engineering of Computer-Based Systems,
2012
DOI:10.1109/ECBS.2012.22
|
|
|
[30]
|
Decision and Game Theory for Security
Lecture Notes in Computer Science,
2012
DOI:10.1007/978-3-642-34266-0_7
|
|
|
[31]
|
An Evolutionary Game Theory Approach for Intelligent Patrolling
Procedia Computer Science,
2012
DOI:10.1016/j.procs.2012.09.044
|
|
|
[32]
|
Game‐theoretic computing in risk analysis
WIREs Computational Statistics,
2012
DOI:10.1002/wics.1205
|
|
|
[33]
|
On optimal strategies in protecting computer networks
2011 9th IEEE/ACS International Conference on Computer Systems and Applications (AICCSA),
2011
DOI:10.1109/AICCSA.2011.6126582
|
|
|