Dynamic games in cyber-physical security: an overview
From MaRDI portal
Publication:2292106
DOI10.1007/s13235-018-00291-yzbMath1431.91052OpenAlexW2907907364WikidataQ128648344 ScholiaQ128648344MaRDI QIDQ2292106
Tamer Başar, Seyed Rasoul Etesami
Publication date: 3 February 2020
Published in: Dynamic Games and Applications (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s13235-018-00291-y
Hierarchical games (including Stackelberg games) (91A65) Applications of game theory (91A80) Research exposition (monographs, survey articles) pertaining to game theory, economics, and finance (91-02) Stochastic games, stochastic differential games (91A15) Dynamic games (91A25) Signaling and communication in game theory (91A28) Mechanism design theory (91B03)
Related Items
Learning Machiavellian strategies for manipulation in Stackelberg security games ⋮ Game theoretic modeling of economic denial of sustainability (EDoS) attack in cloud computing ⋮ Integer programming methods for solving binary interdiction games ⋮ Cut-The-Rope: A Game of Stealthy Intrusion ⋮ A survey of network interdiction models and algorithms
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Comparing human behavior models in repeated Stackelberg security games: an extended study
- Zero-sum repeated games: recent advances and new links with differential games
- A bandwidth expanding scheme for communication channels with noiseless feedback in the presence of unknown jamming noise
- Solutions to a class of minimax decision problems arising in communication systems
- Communication games with partially soft power constraints
- Jamming in mobile networks: a game-theoretic approach
- A Dynamic Bayesian Security Game Framework for Strategic Defense Mechanism Design
- Game theory meets network security and privacy
- Optimal Zero-Delay Jamming Over an Additive Noise Channel
- Dynamic Games With Asymmetric Information: Common Information Based Perfect Bayesian Equilibria and Sequential Decomposition
- Jamming Attacks on Remote State Estimation in Cyber-Physical Systems: A Game-Theoretic Approach
- gPath: A Game-Theoretic Path Selection Algorithm to Protect Tor’s Anonymity
- A Game-Theoretical Approach for Finding Optimal Strategies in a Botnet Defense Model
- Network Security
- Deception-Based Game Theoretical Approach to Mitigate DoS Attacks
- Risk Averse Stackelberg Security Games with Quantal Response
- Dynamics on Linear Influence Network Games Under Stochastic Environments
- Patrolling a Pipeline
- Strategies for Voter-Initiated Election Audits
- A Game-Theoretic Analysis of Deception over Social Networks Using Fake Avatars
- Network Elicitation in Adversarial Environment
- Optimal Thresholds for Anomaly-Based Intrusion Detection in Dynamical Environments
- A Point-Based Approximate Algorithm for One-Sided Partially Observable Pursuit-Evasion Games
- On Communication over Gaussian Sensor Networks with Adversaries: Further Results
- Game-Theoretic Methods for Robustness, Security, and Resilience of Cyberphysical Control Systems: Games-in-Games Principle for Optimal Cross-Layer Resilient Control Systems
- A complete characterization of minimax and maximin encoder- decoder policies for communication channels with incomplete statistical description
- Optimum linear causal coding schemes for Gaussian stochastic processes in the presence of correlated jamming
- Optimum coding and decoding schemes for the transmission of a stochastic process over a continuous-time stochastic channel with partially unknown statisticst†
- The Gaussian test channel with an intelligent jammer
- Prospect Theory: An Analysis of Decision under Risk
- Towards Optimal Algorithms for Prediction with Expert Advice
- Jamming Games in the MIMO Wiretap Channel With an Active Eavesdropper
- A Dynamic Incentive Mechanism for Security in Networks of Interdependent Agents
- Using Signaling Games to Model the Multi-step Attack-Defense Scenarios on Confidentiality
- Deceptive Routing in Relay Networks
- Security Assessment of Electricity Distribution Networks Under DER Node Compromises
- Dynamic Games With Asymmetric Information and Resource Constrained Players With Applications to Security of Cyberphysical Systems
- Incentive Stackelberg Strategies for a Dynamic Game on Terrorism