Cyber-physical systems (CPS) consist of cyber and physical components linked together which are interdependent with each other. These systems are interdependent in complex ways, and failures of a component of the system may have a cascading effect. Ensuring defense on such systems from malicious attack is critical. This research studies the defense strategies on three basic functional interdependent cyber-physical structures based on a simultaneous game model between an attacker and a defender. The player’s utility is evaluated as the difference between her(his) reward and the cost of her(his) action. The pure strategies of Nash equilibrium are obtained for the bus and the star cyber-physical structures, the best responses are obtained for ...
We consider infrastructures consisting of a network of systems, each composed of discrete components...
Many real-world systems are composed of interdependent networks that rely on one another. Such netwo...
Today, information security in defender-attacker game models is getting more attention from the rese...
Most of the cybersecurity research focus on either presenting a specific vulnerability %or hacking t...
This research studies the defense strategy of an interdependent system in the face of rational attac...
Critical infrastructures rely on cyber and physical components that are both subject to natural, inc...
The operation of cyber infrastructures relies on both cyber and physical components, which are subje...
Abstract—We investigate the resilience of cyber physi-cal systems by modeling the interaction betwee...
This paper presents a game-theoretic model, which analyzes Moving-Target Defense in Cyber-Physical S...
Risks faced by information system operators and users are not only determined by their own security ...
In certain critical infrastructures, correlations between cyber and physical components can be explo...
This paper analyzes the optimal strategies for an attacker and a defender in an attack-defense game ...
Computer security in deployed systems is a dynamic interaction between attackers and defenders. Thes...
We propose interdependent defense (IDD) games, a computational game-theoretic framework to study asp...
The simplest conceptual model of cybersecurity implicitly views attackers and defenders as acting in...
We consider infrastructures consisting of a network of systems, each composed of discrete components...
Many real-world systems are composed of interdependent networks that rely on one another. Such netwo...
Today, information security in defender-attacker game models is getting more attention from the rese...
Most of the cybersecurity research focus on either presenting a specific vulnerability %or hacking t...
This research studies the defense strategy of an interdependent system in the face of rational attac...
Critical infrastructures rely on cyber and physical components that are both subject to natural, inc...
The operation of cyber infrastructures relies on both cyber and physical components, which are subje...
Abstract—We investigate the resilience of cyber physi-cal systems by modeling the interaction betwee...
This paper presents a game-theoretic model, which analyzes Moving-Target Defense in Cyber-Physical S...
Risks faced by information system operators and users are not only determined by their own security ...
In certain critical infrastructures, correlations between cyber and physical components can be explo...
This paper analyzes the optimal strategies for an attacker and a defender in an attack-defense game ...
Computer security in deployed systems is a dynamic interaction between attackers and defenders. Thes...
We propose interdependent defense (IDD) games, a computational game-theoretic framework to study asp...
The simplest conceptual model of cybersecurity implicitly views attackers and defenders as acting in...
We consider infrastructures consisting of a network of systems, each composed of discrete components...
Many real-world systems are composed of interdependent networks that rely on one another. Such netwo...
Today, information security in defender-attacker game models is getting more attention from the rese...