Secure networked control systems

H Sandberg, V Gupta… - Annual Review of Control …, 2022 - annualreviews.org
Cyber-vulnerabilities are being exploited in a growing number of control systems. As many
of these systems form the backbone of critical infrastructure and are becoming more …

Learning intrusion prevention policies through optimal stopping

K Hammar, R Stadler - 2021 17th International Conference on …, 2021 - ieeexplore.ieee.org
We study automated intrusion prevention using reinforcement learning. In a novel approach,
we formulate the problem of intrusion prevention as an optimal stopping problem. This …

Intrusion prevention through optimal stopping

K Hammar, R Stadler - IEEE Transactions on Network and …, 2022 - ieeexplore.ieee.org
We study automated intrusion prevention using reinforcement learning. Following a novel
approach, we formulate the problem of intrusion prevention as an (optimal) multiple stopping …

Learning near-optimal intrusion responses against dynamic attackers

K Hammar, R Stadler - IEEE Transactions on Network and …, 2023 - ieeexplore.ieee.org
We study automated intrusion response and formulate the interaction between an attacker
and a defender as an optimal stopping game where attack and defense strategies evolve …

Learning security strategies through game play and optimal stopping

K Hammar, R Stadler - arXiv preprint arXiv:2205.14694, 2022 - arxiv.org
We study automated intrusion prevention using reinforcement learning. Following a novel
approach, we formulate the interaction between an attacker and a defender as an optimal …

A classifications framework for continuous biometric authentication (2018–2024)

D Boshoff, GP Hancke - Computers & Security, 2025 - Elsevier
The increase in personal devices, the amount of private and sensitive information these
devices store/process, and the importance of this information have introduced vital security …

Symbiotic Game and Foundation Models for Cyber Deception Operations in Strategic Cyber Warfare

T Li, Q Zhu - arXiv preprint arXiv:2403.10570, 2024 - arxiv.org
We are currently facing unprecedented cyber warfare with the rapid evolution of tactics,
increasing asymmetry of intelligence, and the growing accessibility of hacking tools. In this …

Privacy-preserving design of scalar lqg control

E Ferrari, Y Tian, C Sun, Z Li, C Wang - Entropy, 2022 - mdpi.com
This paper studies the agent identity privacy problem in the scalar linear quadratic Gaussian
(LQG) control system. The agent identity is a binary hypothesis: Agent A or Agent B. An …

Conducting malicious cybersecurity experiments on crowdsourcing platforms

A Aljohani, J Jones - Proceedings of the 2021 3rd International …, 2021 - dl.acm.org
Evaluating the effectiveness of defense technologies mandates the inclusion of a human
element, specifically if these technologies target human cognition and emotions. One of the …

Optimal Security Response to Network Intrusions in IT Systems

K Hammar - arXiv preprint arXiv:2502.02541, 2025 - arxiv.org
Cybersecurity is one of the most pressing technological challenges of our time and requires
measures from all sectors of society. A key measure is automated security response, which …