Intrusion response systems for cyber-physical systems: A comprehensive survey

M Bashendy, A Tantawy, A Erradi - Computers & Security, 2023 - Elsevier
Abstract Cyberattacks on Cyber-Physical Systems (CPS) are on the rise due to CPS
increased networked connectivity and may cause costly environmental hazards as well as …

Optimal countermeasures selection against cyber attacks: A comprehensive survey on reaction frameworks

P Nespoli, D Papamartzivanos… - … Surveys & Tutorials, 2017 - ieeexplore.ieee.org
It is without doubt that today the volume and sophistication of cyber attacks keeps
consistently growing, militating an endless arm race between attackers and defenders. In …

[PDF][PDF] Trends and applications in Stackelberg security games

D Kar, TH Nguyen, F Fang, M Brown… - Handbook of dynamic …, 2017 - andrew.cmu.edu
Security is a critical concern around the world, whether it is the challenge of protecting ports,
airports and other critical infrastructure, interdicting the illegal flow of drugs, weapons and …

From physical security to cybersecurity

A Sinha, TH Nguyen, D Kar, M Brown… - Journal of …, 2015 - academic.oup.com
Security is a critical concern around the world. In many domains from cybersecurity to
sustainability, limited security resources prevent complete security coverage at all times …

Stackelberg planning: Towards effective leader-follower state space search

P Speicher, M Steinmetz, M Backes… - Proceedings of the …, 2018 - ojs.aaai.org
Inspired by work on Stackelberg security games, we introduce Stackelberg planning, where
a leader player in a classical planning task chooses a minimum-cost action sequence aimed …

[HTML][HTML] CROSS: A framework for cyber risk optimisation in smart homes

Y Zhang, P Malacaria, G Loukas, E Panaousis - Computers & Security, 2023 - Elsevier
This work introduces a decision support framework, called Cyber Risk Optimiser for Smart
homeS (CROSS), which advises both smart home users and smart home service providers …

Using game theory to model DoS attack and defence

B Kumar, B Bhuyan - Sādhanā, 2019 - Springer
Denial of service (DoS) or distributed denial of service (DDoS) attacks based on bandwidth
depletion remain a persistent network security threat and have always been an important …

Pareto-optimal defenses for the web infrastructure: Theory and practice

G Di Tizio, P Speicher, M Simeonovski… - ACM Transactions on …, 2023 - dl.acm.org
The integrity of the content a user is exposed to when browsing the web relies on a plethora
of non-web technologies and an infrastructure of interdependent hosts, communication …

[HTML][HTML] Dealing with uncertainty in cybersecurity decision support

Y Zhang, P Malacaria - Computers & Security, 2024 - Elsevier
The mathematical modeling of cybersecurity decision-making heavily relies on cybersecurity
metrics. However, achieving precision in these metrics is notoriously challenging, and their …

Enhancing Network Resilience through Machine Learning-powered Graph Combinatorial Optimization: Applications in Cyber Defense and Information Diffusion

D Goel - arXiv preprint arXiv:2310.10667, 2023 - arxiv.org
With the burgeoning advancements of computing and network communication technologies,
network infrastructures and their application environments have become increasingly …