From physical security to cybersecurity

A Sinha, TH Nguyen, D Kar, M Brown… - Journal of …, 2015 - academic.oup.com
Security is a critical concern around the world. In many domains from cybersecurity to
sustainability, limited security resources prevent complete security coverage at all times …

[HTML][HTML] Dynamic defenses in cyber security: Techniques, methods and challenges

Y Zheng, Z Li, X Xu, Q Zhao - Digital Communications and Networks, 2022 - Elsevier
Driven by the rapid development of the Internet of Things, cloud computing and other
emerging technologies, the connotation of cyberspace is constantly expanding and …

Supervisor synthesis to thwart cyber attack with bounded sensor reading alterations

R Su - Automatica, 2018 - Elsevier
One of the major challenges about cyber–physical systems is how to protect system integrity
from cyber attacks. There has been a large number of different types of attacks discussed in …

Analysis and control for resilience of discrete event systems: Fault diagnosis, opacity and cyber security

JC Basilio, CN Hadjicostis, R Su - Foundations and Trends® …, 2021 - nowpublishers.com
Abstract System resilience captures the ability of the system to withstand a major disruption
within acceptable performance degradation and to recover within an acceptable time frame …

Learning intrusion prevention policies through optimal stopping

K Hammar, R Stadler - 2021 17th International Conference on …, 2021 - ieeexplore.ieee.org
We study automated intrusion prevention using reinforcement learning. In a novel approach,
we formulate the problem of intrusion prevention as an optimal stopping problem. This …

Intrusion prevention through optimal stopping

K Hammar, R Stadler - IEEE Transactions on Network and …, 2022 - ieeexplore.ieee.org
We study automated intrusion prevention using reinforcement learning. Following a novel
approach, we formulate the problem of intrusion prevention as an (optimal) multiple stopping …

Deception-based game theoretical approach to mitigate DoS attacks

H Çeker, J Zhuang, S Upadhyaya, QD La… - Decision and Game …, 2016 - Springer
Abstract Denial of Service (DoS) attacks prevent legitimate users from accessing resources
by compromising availability of a system. Despite advanced prevention mechanisms, DoS …

Learning near-optimal intrusion responses against dynamic attackers

K Hammar, R Stadler - IEEE Transactions on Network and …, 2023 - ieeexplore.ieee.org
We study automated intrusion response and formulate the interaction between an attacker
and a defender as an optimal stopping game where attack and defense strategies evolve …

Learning security strategies through game play and optimal stopping

K Hammar, R Stadler - arXiv preprint arXiv:2205.14694, 2022 - arxiv.org
We study automated intrusion prevention using reinforcement learning. Following a novel
approach, we formulate the interaction between an attacker and a defender as an optimal …

Security of multi-agent cyber-physical systems: A survey

R Owoputi, S Ray - IEEE Access, 2022 - ieeexplore.ieee.org
Multi-agent systems are becoming increasingly popular due to their successful
implementation in several sectors. However, there are a variety of threats that might …