This paper presents a control strategy for Cyber-Physical System defense developed in the framework of the European Project ATENA, that concerns Critical Infrastructure (CI) protection. The aim of the controller is to find the optimal security configuration, in terms of countermeasures to implement, in order to address the system vulnerabilities. The attack/defense problem is modeled as a multi-agent general sum game, where the aim of the defender is to prevent the most damage possible by finding an optimal trade-off between prevention actions and their costs. The problem is solved utilizing Reinforcement Learning and simulation results provide a proof of the proposed concept, showing how the defender of the protected CI is able to minimize...
This paper focuses on cyber-security simulations in networks modeled as a Markov game with incomplet...
In this paper, we present a novel representation for cyber-physical systems wherein the states of th...
This paper focuses on cyber-security simulations in networks modeled as a Markov game with incomplet...
This paper presents a control strategy for CyberPhysical System defense developed in the framework o...
Modern critical infrastructures are highly integrated systems composed of many complex interactions ...
Critical infrastructures rely on cyber and physical components that are both subject to natural, inc...
This article investigates the secure control problem for cyber-physical systems when the malicious d...
The operation of cyber infrastructures relies on both cyber and physical components, which are subje...
The existing cyberspace attack and defense method can be regarded as game, but most of the game only...
Most of the cybersecurity research focus on either presenting a specific vulnerability %or hacking t...
This paper focuses on cyber-security simulations in networks modeled as a Markov game with incomplet...
This paper focuses on cyber-security simulations in networks modeled as a Markov game with incomplet...
International audienceInfrastructure networks are vulnerable to both cyber and physical attacks. Bui...
This paper focuses on cyber-security simulations in networks modeled as a Markov game with incomplet...
This paper focuses on cyber-security simulations in networks modeled as a Markov game with incomplet...
This paper focuses on cyber-security simulations in networks modeled as a Markov game with incomplet...
In this paper, we present a novel representation for cyber-physical systems wherein the states of th...
This paper focuses on cyber-security simulations in networks modeled as a Markov game with incomplet...
This paper presents a control strategy for CyberPhysical System defense developed in the framework o...
Modern critical infrastructures are highly integrated systems composed of many complex interactions ...
Critical infrastructures rely on cyber and physical components that are both subject to natural, inc...
This article investigates the secure control problem for cyber-physical systems when the malicious d...
The operation of cyber infrastructures relies on both cyber and physical components, which are subje...
The existing cyberspace attack and defense method can be regarded as game, but most of the game only...
Most of the cybersecurity research focus on either presenting a specific vulnerability %or hacking t...
This paper focuses on cyber-security simulations in networks modeled as a Markov game with incomplet...
This paper focuses on cyber-security simulations in networks modeled as a Markov game with incomplet...
International audienceInfrastructure networks are vulnerable to both cyber and physical attacks. Bui...
This paper focuses on cyber-security simulations in networks modeled as a Markov game with incomplet...
This paper focuses on cyber-security simulations in networks modeled as a Markov game with incomplet...
This paper focuses on cyber-security simulations in networks modeled as a Markov game with incomplet...
In this paper, we present a novel representation for cyber-physical systems wherein the states of th...
This paper focuses on cyber-security simulations in networks modeled as a Markov game with incomplet...