craving 发表于 2025-3-28 14:43:36
A Scalable Decomposition Method for the Dynamic Defense of Cyber Networksacks and the network’s security status and instead must use its imperfect observations to determine a defense strategy. The nature of the defender’s imperfect information is assumed to be non-probabilistic. Thus, the defender takes a conservative (minmax) approach to defending the network, attemptin谄媚于性 发表于 2025-3-28 21:16:39
Factored Markov Game Theory for Secure Interdependent Infrastructure Networksnet of Things (IoTs), the CIs are becoming vulnerable to cyber threats at the same time improving its connectivity and functionalities. Hence it is essential to understand the risk of ICTs on CIs holistically as a cyber-physical system and design efficient security hardening mechanisms to reduce the保全 发表于 2025-3-29 02:18:42
G-DPS: A Game-Theoretical Decision-Making Framework for Physical Surveillance Gamescent terrorist attacks bring critical infrastructure into a severer environment. Many critical infrastructures, in particular those operating large industry complexes, incorporate some kind of physical surveillance technologies to secure their premises. Surveillance systems, such as access control a施魔法 发表于 2025-3-29 05:11:30
A Game-Theoretic Framework for Securing Interdependent Assets in Networksakeholders. The interdependencies between the assets play a critical role in the security of the overall system, especially against strategic attackers who exploit these interdependencies to target valuable assets. In this work, we develop a general game-theoretic framework to model the security inv永久 发表于 2025-3-29 08:35:01
Random Damage in Interconnected Networkse modeled using a game-theoretic approach. Preparing a game require several steps, including the definition of attack and defense strategies, estimation of payoffs, etc. Specifically, during the preparation of a game, the estimation of payoffs (i.e. damage) for each possible scenario is one of its cCOMMA 发表于 2025-3-29 13:48:33
http://reply.papertrans.cn/39/3806/380508/380508_46.pngABYSS 发表于 2025-3-29 16:08:09
Managing Security Risks Interdependencies Between ICT and Electric Infrastructures: A Game Theoreticshelf operating systems in the communication infrastructure has the potential to increase the attack surface of the power grid. In this chapter, we address the issue of the security risk management of interdependent communication and electric infrastructures in the smart grid by proposing an analytiInstrumental 发表于 2025-3-29 21:43:23
Security and Interdependency in a Public Cloud: A Game-Theoretic Approachc cloud computing is cost-effective: a cloud user can reduce spending on technology infrastructure and have easy access to their information without an up-front or long-term commitment of resources. Despite such benefits, concern over cyber security deters many large organizations with sensitive inf易弯曲 发表于 2025-3-30 00:26:29
A Risk Management Approach for Highly Interconnected Networks of potential threats and security issues as well as a proper assessment of the respective risks is a core duty of utility providers. Despite the fact that utility providers operate several networks (e.g., communication, control, and utility networks), most of today’s risk management tools only focu吞下 发表于 2025-3-30 05:21:32
Protecting Water Utility Networks from Advanced Persistent Threats: A Case Studyotection of utilities that provision critical services (e.g., water, electricity, telecommunications) is of vital importance given the severity imposed by any failure of these services. Recent security incidents in the context of critical infrastructures indicate that threats in such environments ap