A survey: When moving target defense meets game theory

J Tan, H Jin, H Zhang, Y Zhang, D Chang, X Liu… - Computer Science …, 2023 - Elsevier
Moving target defense (MTD) can break through asymmetry between attackers and
defenders. To improve the effectiveness of cybersecurity defense techniques, defense …

A comprehensive survey on the cyber-security of smart grids: Cyber-attacks, detection, countermeasure techniques, and future directions

TT Khoei, HO Slimane, N Kaabouch - arXiv preprint arXiv:2207.07738, 2022 - arxiv.org
One of the significant challenges that smart grid networks face is cyber-security. Several
studies have been conducted to highlight those security challenges. However, the majority …

Optimal stealthy integrity attacks on remote state estimation: The maximum utilization of historical data

J Shang, T Chen - Automatica, 2021 - Elsevier
This paper considers the problem of optimal stealthy integrity attacks on remote state
estimation. Smart sensors transmit innovations to a remote estimator through a wireless …

Recursive watermarking-based transient covert attack detection for the industrial cps

L Ma, Z Chu, C Yang, G Wang… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
The subject of attack detection for industrial cyber-physical systems (IPCSs) is covered in
this paper, which addresses threats from transient covert attacks (TCAs), also referred to as …

Learning-based secure control for multichannel networked systems under smart attacks

Y Yu, GP Liu, W Hu - IEEE Transactions on Industrial …, 2022 - ieeexplore.ieee.org
This article is concerned with the security control of a class of discrete-time linear
cyberphysical systems (CPSs) subject to denial-of-service attacks. To enhance the inherent …

Single-dimensional encryption against innovation-based stealthy attacks on remote state estimation

J Shang, J Zhou, T Chen - Automatica, 2022 - Elsevier
Remote state estimation through a wireless communication network is usually vulnerable to
malicious cyber-attacks, which can manipulate transmitted data without even being …

Event-triggered data-driven control for nonlinear systems under frequency-duration-constrained DoS attacks

X Bu, W Yu, Y Yin, Z Hou - IEEE Transactions on Information …, 2022 - ieeexplore.ieee.org
This paper addresses the event-triggered model free adaptive control (MFAC) problem for
unknown nonlinear systems under denial-of-service (DoS) attacks, where the design and …

Anti-jamming game to combat intelligent jamming for cognitive radio networks

K Ibrahim, SX Ng, IM Qureshi, AN Malik… - IEEE Access, 2021 - ieeexplore.ieee.org
Cognitive Radio (CR) provides a promising solution to the spectrum scarcity problem in
dense wireless networks, where the sensing ability of cognitive users helps acquire …

Cybersecurity threat assessment integrating qualitative differential and evolutionary games

H Zhang, J Tan, X Liu, S Huang, H Hu… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Most current game theory-based cybersecurity analysis methods use traditional game
models, which do not meet realistic conditions of continuous dynamic changes in attack …

Rollout approach to sensor scheduling for remote state estimation under integrity attack

H Liu, Y Li, KH Johansson, J Mårtensson, L Xie - Automatica, 2022 - Elsevier
We consider the sensor scheduling problem for remote state estimation under integrity
attacks. We seek to optimize a trade-off between the energy consumption of communications …