Game theoretical security detection strategy for networked systems
Tài liệu tham khảo
Ashfaq, 2014, Information theoretic feature space slicing for statistical anomaly detection, J. Netw. Comput. Appl., 41, 473, 10.1016/j.jnca.2014.01.002
Amin, 2013, Security of interdependent and identical networked control systems, Automatica, 49, 186, 10.1016/j.automatica.2012.09.007
Alpcan, 2011
Bradai, 2013, Game theoretic framework for reputation-based distributed intrusion detection
Balasubramanian, 2013, Fault tolerance in distributed systems using fused data structures, IEEE Trans. Parallel Distrib. Syst., 24, 701, 10.1109/TPDS.2012.96
Basar, 1987, Relaxation techniques and asynchronous algorithms for on-line computation of non-cooperative equilibria, J. Econ. Dyn. Control, 11, 531, 10.1016/S0165-1889(87)80006-4
Basar, 1999
Chen, 2009, A game theoretical framework on intrusion detection in heterogeneous networks, IEEE Trans. Inf. Forensics Secur., 4, 165, 10.1109/TIFS.2009.2019154
Fudenberg, 1991
Firouzbakht, 2016, Linearly constrained bimatrix games in wireless communications, IEEE Trans. Commun., 64, 429, 10.1109/TCOMM.2015.2504085
Garnaev, 2016, Anti-jamming strategy versus a low-power jamming attack when intelligence of adversary’s attack type is unknown, IEEE Trans. Signal Inf. Process. Netw., 2, 49, 10.1109/TSIPN.2015.2506038
von Heusinger, 2010, Newtons method for computing a normalized equilibrium in the generalized Nash game through fixed point formulation, Math. Progr., 132, 99
Ismail, 2014, A game theoretical analysis of data confidentiality attacks on smart-grid AMI, IEEE J. Sel. Areas Commun., 32, 1486, 10.1109/JSAC.2014.2332095
Keliris, 2013, A distributed fault detection filtering approach for a class of interconnected continuous-time nonlinear systems, IEEE Trans. Autom. Control, 58, 2032, 10.1109/TAC.2013.2253231
Li, 2010, Attack and flee: game-theory-based analysis on interactions among nodes in MANETs, IEEE Trans. Syst. Man Cybern. Part B Cybern., 40, 612, 10.1109/TSMCB.2009.2035929
Liao, 2013, Intrusion detection system: a comprehensive review, J. Netw. Comput. Appl., 36, 16, 10.1016/j.jnca.2012.09.004
Lian, 2015, Passivity of switched recurrent neural networks with time-varying delays, IEEE J. Neural Netw. Learn. Syst., 26, 357, 10.1109/TNNLS.2014.2379920
Li, 1987, Distributed algorithms for the computation of non-cooperative equilibria, Automatica, 23, 523, 10.1016/0005-1098(87)90081-1
Liang, 2013, Game theory for network security, IEEE Commun. Surv. Tutor., 15, 472, 10.1109/SURV.2012.062612.00056
Liu, 2006, A Bayesian game approach for intrusion detection in wireless ad hoc networks, ACM Int. Conf. Proc. Ser., 199
Manikopoulos, 2002, Network intrusion and fault detection: a statistical anomaly approach, IEEE Commun. Mag., 40, 76, 10.1109/MCOM.2002.1039860
Ma, 2013, Markov game analysis for attack-defense of power networks under possible misinformation, IEEE Trans. Power Syst., 28, 1676, 10.1109/TPWRS.2012.2226480
Moosavi, 2014, A game-theoretic framework for robust optimal intrusion detection in wireless sensor networks, IEEE Trans. Inf. Forensics Secur., 9, 1367, 10.1109/TIFS.2014.2332816
Manshaei, 2013, Game theory meets network security and privacy, ACM Comput. Surv., 45, 10.1145/2480741.2480742
Nguyen, 2009, Security games with incomplete information
Nguyen, 2009, Stochastic games for security in networks with interdependent nodes
Nguyen, 2010, Security games with decision and observation errors
Rosen, 1965, Existence and uniqueness of equilibrium points for concave n-person games, Econometrica, 33, 520, 10.2307/1911749
Roy, 2010, A survey of game theory as applied to network security
Shames, 2011, Distributed fault detection for interconnected second-order systems, Automatica, 47, 2757, 10.1016/j.automatica.2011.09.011
Sagduyu, 2009, MAC games for distributed wireless network security with incomplete information of selfish and malicious user types
Sagduyu, 2011, Jamming games in wireless networks with incomplete information, IEEE Commun. Mag., 49, 112, 10.1109/MCOM.2011.5978424
Teodoro, 2009, Anomaly-based network intrusion detection: techniques, systems and challenges, Comput. Secur., 28, 18, 10.1016/j.cose.2008.08.003
Wang, 2013, Output feedback control of networked control systems with packet dropouts in both channels, Inf. Sci. (Ny), 221, 544, 10.1016/j.ins.2012.09.045
Wang, 2016, Distributed filtering for switched nonlinear positive systems with missing measurements over sensor networks, IEEE Sens. J., 16, 4940, 10.1109/JSEN.2016.2555761
Wei, 2012, CSI Usage over parallel fading channels under jamming attacks: a game theory study, IEEE Trans. Commun., 60, 1167, 10.1109/TCOMM.2012.021712.100018
Wang, 2010, Attacker detection game in wireless networks with channel uncertainty
Wang, 2014, A game theoretic approach to detect and co-exist with malicious nodes in wireless networks, Comput. Netw., 71, 63, 10.1016/j.comnet.2014.06.008
Xiao, 2012, Indirect reciprocity security game for large-scale wireless networks, IEEE Trans. Inf. Forensics Secur., 7, 1368, 10.1109/TIFS.2012.2202228
Yang, 2013, Coping with a smart jammer in wireless networks: a Stackelberg game approach, IEEE Trans. Wireless Commun., 12, 4038, 10.1109/TWC.2013.071913121570
Yang, 2015, Fault recoverability and fault tolerant control for a class of interconnected nonlinear systems, Automatica, 54, 49, 10.1016/j.automatica.2015.01.037
Yu, 2011, Traceback of DDos attacks using entropy variations, IEEE Trans. Parallel Distrib. Syst., 22, 412, 10.1109/TPDS.2010.97
Yu, 2008, Secure cooperation in autonomous mobile ad-hoc networks under noise and imperfect monitoring: a game-theoretic approach, IEEE Trans. Inf. Forensics Secur., 3, 317, 10.1109/TIFS.2008.922453
Zhu, 2012, GUIDEX: a game-theoretic incentive-based mechanism for intrusion detection networks, IEEE J. Sel. Areas Commun., 30, 2220, 10.1109/JSAC.2012.121214
Zhu, 2010, Network security configurations: a nonzero-sum stochastic game approach
Zonouz, 2014, RRE: a game-theoretic intrusion response and recovery engine, IEEE Trans. Parallel Distrib. Syst., 25, 395, 10.1109/TPDS.2013.211