메뉴 건너뛰기




Volumn 49, Issue 1, 2013, Pages 186-192

Security of interdependent and identical networked control systems

Author keywords

Interdependent security; Nash games; Network reliability; Networked control systems; System security

Indexed keywords

CONTROL INPUTS; INDIVIDUAL SYSTEMS; INTERDEPENDENT SECURITY; NASH GAMES; NEGATIVE EXTERNALITIES; NETWORK RELIABILITY; NONCOOPERATIVE GAME; OPTIMAL SECURITY; SECURITY INVESTMENTS; SOCIAL OPTIMUMS; STOCHASTIC LINEAR SYSTEMS; SYSTEM SECURITY;

EID: 84871258626     PISSN: 00051098     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.automatica.2012.09.007     Document Type: Article
Times cited : (215)

References (24)
  • 4
    • 62949107154 scopus 로고    scopus 로고
    • Special issue on technology of networked control systems
    • P. Antsaklis, and J. Baillieul Special issue on technology of networked control systems Proceedings of the IEEE 95 1 2007 5 8
    • (2007) Proceedings of the IEEE , vol.95 , Issue.1 , pp. 5-8
    • Antsaklis, P.1    Baillieul, J.2
  • 5
    • 34547641190 scopus 로고    scopus 로고
    • Choosing what to protect: Strategic defensive allocation against an unknown attacker
    • V. Bier, S. Oliveros, and L. Samuelson Choosing what to protect: strategic defensive allocation against an unknown attacker Journal of Public Economic Theory 9 4 2007 563 587
    • (2007) Journal of Public Economic Theory , vol.9 , Issue.4 , pp. 563-587
    • Bier, V.1    Oliveros, S.2    Samuelson, L.3
  • 8
    • 18944385964 scopus 로고    scopus 로고
    • The value of intrusion detection systems in information technology security architecture
    • H. Cavusoglu, B. Mishra, and S. Raghunathan The value of intrusion detection systems in information technology security architecture Information Systems Research 16 1 2005 28 46
    • (2005) Information Systems Research , vol.16 , Issue.1 , pp. 28-46
    • Cavusoglu, H.1    Mishra, B.2    Raghunathan, S.3
  • 11
    • 34848844983 scopus 로고    scopus 로고
    • NBER Working papers 10706. National Bureau of Economic Research, Inc.; August
    • Heal, G.; Kunreuther, H. (2004). Interdependent security: a general model. NBER Working papers 10706. National Bureau of Economic Research, Inc.; August.
    • (2004) Interdependent Security: A General Model
    • Heal, G.1    Kunreuther, H.2
  • 12
    • 64149124758 scopus 로고    scopus 로고
    • A survey of recent results in networked control systems
    • J.P. Hespanha, P. Naghshtabrizi, and Y. Xu A survey of recent results in networked control systems Proceedings of the IEEE 95 1 2007 138 162
    • (2007) Proceedings of the IEEE , vol.95 , Issue.1 , pp. 138-162
    • Hespanha, J.P.1    Naghshtabrizi, P.2    Xu, Y.3
  • 13
    • 34547524797 scopus 로고    scopus 로고
    • Internalizing externalities of loss prevention through insurance monopoly: An analysis of interdependent risks
    • A. Hofmann Internalizing externalities of loss prevention through insurance monopoly: an analysis of interdependent risks The Geneva Risk and Insurance Review 32 1 2007 91 111
    • (2007) The Geneva Risk and Insurance Review , vol.32 , Issue.1 , pp. 91-111
    • Hofmann, A.1
  • 15
    • 33746037180 scopus 로고    scopus 로고
    • Optimal control of LTI systems over unreliable communication links
    • O.C. Imer, S. Yüksel, and T. Başar Optimal control of LTI systems over unreliable communication links Automatica 42 9 2006 1429 1439
    • (2006) Automatica , vol.42 , Issue.9 , pp. 1429-1439
    • Imer, O.C.1    Yüksel, S.2    Başar, T.3
  • 16
    • 79957616447 scopus 로고    scopus 로고
    • Stuxnet: Dissecting a cyberwarfare weapon
    • R. Langner Stuxnet: dissecting a cyberwarfare weapon IEEE Security and Privacy 9 3 2011 49 51
    • (2011) IEEE Security and Privacy , vol.9 , Issue.3 , pp. 49-51
    • Langner, R.1
  • 18
    • 57349135233 scopus 로고    scopus 로고
    • Network externalities and the deployment of security features and protocols in the Internet
    • M. Lelarge, and J. Bolot Network externalities and the deployment of security features and protocols in the Internet SIGMETRICS Performance Evaluation Review 36 1 2008 37 48
    • (2008) SIGMETRICS Performance Evaluation Review , vol.36 , Issue.1 , pp. 37-48
    • Lelarge, M.1    Bolot, J.2
  • 21
    • 77955362057 scopus 로고    scopus 로고
    • Dynamic control and mitigation of interdependent IT security risks
    • ICC IEEE Communications Society
    • J. Mounzer, T. Alpcan, and N. Bambos Dynamic control and mitigation of interdependent IT security risks Proc. of the IEEE conference on communication ICC 2010 IEEE Communications Society
    • (2010) Proc. of the IEEE Conference on Communication
    • Mounzer, J.1    Alpcan, T.2    Bambos, N.3
  • 22
    • 84988815150 scopus 로고    scopus 로고
    • Technology, policy, law, and ethics regarding US acquisition and use of cyberattack capabilities
    • National Research Council. Philadelphia
    • Owens, W. A.; Dam, K. W.; Lin, H. S. (2009). Technology, policy, law, and ethics regarding US acquisition and use of cyberattack capabilities. Committee on Offensive Information Warfare. National Research Council. Philadelphia.
    • (2009) Committee on Offensive Information Warfare
    • Owens, W.A.1    Dam, K.W.2    Lin, H.S.3
  • 24
    • 33750482906 scopus 로고    scopus 로고
    • System reliability and free riding
    • Kluwer Academic Publishers
    • H.R. Varian System reliability and free riding Economics of information security 2004 Kluwer Academic Publishers 1 15
    • (2004) Economics of Information Security , pp. 1-15
    • Varian, H.R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.