We consider infrastructures consisting of a network of systems, each composed of discrete components. The network provides the vital connectivity between the systems and hence plays a critical, asymmetric role in the infrastructure operations. The individual components of the systems can be attacked by cyber and physical means and can be appropriately reinforced to withstand these attacks. We formulate the problem of ensuring the infrastructure performance as a game between an attacker and a provider, who choose the numbers of the components of the systems and network to attack and reinforce, respectively. The costs and benefits of attacks and reinforcements are characterized using the sum-form, product-form and composite utility functions,...
We propose interdependent defense (IDD) games, a computational game-theoretic framework to study asp...
Infrastructure networks are a key feature of an economy. Their functionality depends on the connecti...
This paper presents a control strategy for CyberPhysical System defense developed in the framework o...
We consider infrastructures consisting of a network of systems, each composed of discrete components...
https://doi.org/10.3390/s18051421We consider infrastructures consisting of a network of systems, eac...
In certain critical infrastructures, correlations between cyber and physical components can be explo...
In certain critical infrastructures, correlations between cyber and physical components can be explo...
The operation of cyber infrastructures relies on both cyber and physical components, which are subje...
Critical infrastructures rely on cyber and physical components that are both subject to natural, inc...
Abstract—A cloud computing infrastructure typically consists of a number of sites that house servers...
Maintaining the security of critical infrastructure networks is vital for a modern economy. This pap...
Maintaining the security of critical infrastructure networks is vital for a modern economy. This pap...
Abstract—We investigate the resilience of cyber physi-cal systems by modeling the interaction betwee...
International audienceInfrastructure networks are vulnerable to both cyber and physical attacks. Bui...
This paper presents a control strategy for Cyber-Physical System defense developed in the framework ...
We propose interdependent defense (IDD) games, a computational game-theoretic framework to study asp...
Infrastructure networks are a key feature of an economy. Their functionality depends on the connecti...
This paper presents a control strategy for CyberPhysical System defense developed in the framework o...
We consider infrastructures consisting of a network of systems, each composed of discrete components...
https://doi.org/10.3390/s18051421We consider infrastructures consisting of a network of systems, eac...
In certain critical infrastructures, correlations between cyber and physical components can be explo...
In certain critical infrastructures, correlations between cyber and physical components can be explo...
The operation of cyber infrastructures relies on both cyber and physical components, which are subje...
Critical infrastructures rely on cyber and physical components that are both subject to natural, inc...
Abstract—A cloud computing infrastructure typically consists of a number of sites that house servers...
Maintaining the security of critical infrastructure networks is vital for a modern economy. This pap...
Maintaining the security of critical infrastructure networks is vital for a modern economy. This pap...
Abstract—We investigate the resilience of cyber physi-cal systems by modeling the interaction betwee...
International audienceInfrastructure networks are vulnerable to both cyber and physical attacks. Bui...
This paper presents a control strategy for Cyber-Physical System defense developed in the framework ...
We propose interdependent defense (IDD) games, a computational game-theoretic framework to study asp...
Infrastructure networks are a key feature of an economy. Their functionality depends on the connecti...
This paper presents a control strategy for CyberPhysical System defense developed in the framework o...