Reinforcement learning for feedback-enabled cyber resilience

Y Huang, L Huang, Q Zhu - Annual reviews in control, 2022 - Elsevier
The rapid growth in the number of devices and their connectivity has enlarged the attack
surface and made cyber systems more vulnerable. As attackers become increasingly …

A systematic review of cyber-resilience assessment frameworks

DAS Estay, R Sahay, MB Barfod, CD Jensen - Computers & security, 2020 - Elsevier
Cyber-attacks are regarded as one of the most serious threats to businesses worldwide.
Organizations dependent on Information Technology (IT) derive value not only from …

Expanding the Gordon-Loeb model to cyber-insurance

HRK Skeoch - Computers & Security, 2022 - Elsevier
We present an economic model for decisions on competing cyber-security and cyber-
insurance investment based on the Gordon-Loeb model for investment in information …

Interdependent strategic security risk management with bounded rationality in the internet of things

J Chen, Q Zhu - IEEE Transactions on Information Forensics …, 2019 - ieeexplore.ieee.org
With the increasing connectivity enabled by the Internet of Things (IoT), security becomes a
critical concern, and users should invest to secure their IoT applications. Due to the massive …

: A Game-Theoretic Cyber Insurance Framework for Incentive-Compatible Cyber Risk Management of Internet of Things

R Zhang, Q Zhu - IEEE Transactions on Information Forensics …, 2019 - ieeexplore.ieee.org
Internet of Things (IoT) is highly vulnerable to emerging Advanced Persistent Threats (APTs)
that are often operated by well-resourced adversaries. Achieving perfect security for IoT …

Adaptive honeypot engagement through reinforcement learning of semi-markov decision processes

L Huang, Q Zhu - Decision and Game Theory for Security: 10th …, 2019 - Springer
A honeynet is a promising active cyber defense mechanism. It reveals the fundamental
Indicators of Compromise (IoCs) by luring attackers to conduct adversarial behaviors in a …

[PDF][PDF] Dynamic games for secure and resilient control system design

Y Huang, J Chen, L Huang, Q Zhu - National Science Review, 2020 - academic.oup.com
Modern control systems are featured by their hierarchical structure composed of cyber,
physical and human layers. The intricate dependencies among multiple layers and units of …

Cybersecurity in robotics: Challenges, quantitative modeling, and practice

Q Zhu, S Rass, B Dieber… - Foundations and Trends …, 2021 - nowpublishers.com
Robotics is becoming more and more ubiquitous, but the pressure to bring systems to
market occasionally goes at the cost of neglecting security mechanisms during the …

Cyber insurance against cyberattacks on electric vehicle charging stations

S Acharya, R Mieth, C Konstantinou… - … on Smart Grid, 2021 - ieeexplore.ieee.org
Cyberattacks in the energy sector are commonplace. Load-altering cyberattacks launched
via the manipulations of high-wattage appliances and assets are particularly alarming, as …

Game theory meets network security: A tutorial

Q Zhu, S Rass - Proceedings of the 2018 ACM SIGSAC conference on …, 2018 - dl.acm.org
The increasingly pervasive connectivity of today's information systems brings up new
challenges to security. Traditional security has accomplished a long way toward protecting …