-
1
-
-
78649666612
-
Electricity infrastructure security: Toward reliable, resilient and secure cyber-physical power and energy systems
-
IEEE, Minneapolis, MN, 3405 He, Zhuang and Rao September
-
Amin, S. M, 2010, Electricity infrastructure security: Toward reliable, resilient and secure cyber-physical power and energy systems, Proceedings of the Power and Energy Society General Meeting, IEEE, Minneapolis, MN, 3405 He, Zhuang and Rao September.
-
(2010)
Proceedings of the Power and Energy Society General Meeting
-
-
Amin, S.M.1
-
2
-
-
33845439386
-
Defending critical infrastructure
-
Brown, G., Carlyle, M., Salmeron, J., and Salmeron, K., 2006, Defending critical infrastructure, Interfaces, 36 (6):530-544.
-
(2006)
Interfaces
, vol.36
, Issue.6
, pp. 530-544
-
-
Brown, G.1
Carlyle, M.2
Salmeron, J.3
Salmeron, K.4
-
3
-
-
79960617357
-
A game theoretic study of attack and defense in cyber-physical systems
-
Shanghai, China
-
Rao, N. S. V., Ma, C. Y. T., and Yau, D. K. Y., 2011, A game theoretic study of attack and defense in cyber-physical systems, IEEE INFOCOM Workshop, Shanghai, China.
-
(2011)
IEEE INFOCOM Workshop
-
-
Rao, N.S.V.1
Ma, C.Y.T.2
Yau, D.K.Y.3
-
4
-
-
85045163517
-
The role of modeling in the resilience of cyberinfrastructure systems and preparedness for cyber intrusions
-
Article 6
-
Chittister, C. G., and Haimes, Y. Y., 2011, The role of modeling in the resilience of cyberinfrastructure systems and preparedness for cyber intrusions, Journal of Homeland Security and Emergency Management, 8(1), Article 6.
-
(2011)
Journal of Homeland Security and Emergency Management
, vol.8
, Issue.1
-
-
Chittister, C.G.1
Haimes, Y.Y.2
-
5
-
-
33847422324
-
Risk assessment for physical and cyber attacks on critical infrastructures
-
IEEE, IEEE
-
Depoy, J., Phelan, J., Sholander, P., Smith, B., Varnado, G. B., and Wyss, G., 2005, Risk assessment for physical and cyber attacks on critical infrastructures, Military Communications Conference, 2005. MILCOM 2005. IEEE, pages 1961-1969. IEEE.
-
(2005)
Military Communications Conference, 2005, MILCOM 2005
, pp. 1961-1969
-
-
Depoy, J.1
Phelan, J.2
Sholander, P.3
Smith, B.4
Varnado, G.B.5
Wyss, G.6
-
6
-
-
79952852737
-
Governments' and terrorists' defense and attack in a T-period game
-
Hausken, K. and Zhuang, J., 2011, Governments' and terrorists' defense and attack in a T-period game, Decision Analysis, 8(1):46-70.
-
(2011)
Decision Analysis
, vol.8
, Issue.1
, pp. 46-70
-
-
Hausken, K.1
Zhuang, J.2
-
7
-
-
84860816402
-
Modeling 'contracts' between a terrorist group and a government in a sequential game
-
August, doi10.1057/jors.2011.49
-
He, F. and Zhuang, J., 2011, Modeling 'contracts' between a terrorist group and a government in a sequential game, Journal of the Operational Research Society, August, doi10.1057/jors.2011.49.
-
(2011)
Journal of the Operational Research Society
-
-
He, F.1
Zhuang, J.2
-
8
-
-
79958097006
-
A survey of network theoretic approaches for risk analysis of complex infrastructure systems
-
Hyattsville, MD, April
-
LaRocca, S. and Guikema, S., 2011, A survey of network theoretic approaches for risk analysis of complex infrastructure systems, Vulnerability, Uncertainty, and Risk: Analysis, Modeling, and Management Proceedings of the International Conference on Vulnerability and Risk Analysis and Management (ICVRAM) and International Symposium on Uncertainty Modeling and Analysis (ISUMA), Hyattsville, MD, April.
-
(2011)
Vulnerability, Uncertainty, and Risk: Analysis, Modeling, and Management Proceedings of the International Conference on Vulnerability and Risk Analysis and Management (ICVRAM) and International Symposium on Uncertainty Modeling and Analysis (ISUMA)
-
-
LaRocca, S.1
Guikema, S.2
-
9
-
-
14844293542
-
Game strategies in network security
-
Lye, K. and Wing, J.M., 2005, Game strategies in network security, International Journal of Information Security, 4(1):71-86.
-
(2005)
International Journal of Information Security
, vol.4
, Issue.1
, pp. 71-86
-
-
Lye, K.1
Wing, J.M.2
-
10
-
-
84860692605
-
-
Orlando, FL, USA, December
-
Pasqualetti, F., Dörfler, F., and Bullo, F., 2011, Cyber-physical attacks in power networks: Models, fundamental limitations and monitor design, pages 2195-2201, Orlando, FL, USA, December.
-
(2011)
Cyber-physical Attacks in Power Networks: Models, Fundamental Limitations and Monitor Design
, pp. 2195-2201
-
-
Pasqualetti, F.1
Dörfler, F.2
Bullo, F.3
-
11
-
-
84859902392
-
Cloud computing infrastructure robustness: A game theory approach
-
Maui, Hawaii, January
-
Rao, N. S. V., Poole, S. W., Ma, C. Y. T., He, F., Zhuang, J., and Yau, D. K. Y., 2012, Cloud computing infrastructure robustness: A game theory approach, Proceedings of the International Conference on Computing, Networking and Communications, Maui, Hawaii, January.
-
(2012)
Proceedings of the International Conference on Computing, Networking and Communications
-
-
Rao, N.S.V.1
Poole, S.W.2
Ma, C.Y.T.3
He, F.4
Zhuang, J.5
Yau, D.K.Y.6
-
12
-
-
77951729734
-
A survey of game theory as applied to network security
-
IEEE Computer Society
-
Roy, S., Ellis, C., Shiva, S., Dasgupta, D., Shandilya, V., and Wu, Q., 2010, A survey of game theory as applied to network security, Hawaii International Conference on System Sciences, pages 1-10, IEEE Computer Society.
-
(2010)
Hawaii International Conference on System Sciences
, pp. 1-10
-
-
Roy, S.1
Ellis, C.2
Shiva, S.3
Dasgupta, D.4
Shandilya, V.5
Wu, Q.6
-
13
-
-
78649555609
-
Progress towards a resilient power grid infrastructure
-
2010 IEEE, Minneapolis, MN, IEEE
-
Sanders, W.H., 2010, Progress towards a resilient power grid infrastructure, Proceedings of the Power and Energy Society General Meeting, 2010 IEEE, pages 1-3, Minneapolis, MN, IEEE.
-
(2010)
Proceedings of the Power and Energy Society General Meeting
, pp. 1-3
-
-
Sanders, W.H.1
-
14
-
-
84874173102
-
Cyber-physical system security for the electric power grid
-
Sridhar, S., Hahn, A., and Govindarasu, M., 2011, Cyber-physical system security for the electric power grid, Proceedings of the IEEE, (99):1-15.
-
(2011)
Proceedings of the IEEE
, Issue.99
, pp. 1-15
-
-
Sridhar, S.1
Hahn, A.2
Govindarasu, M.3
-
15
-
-
77953177089
-
Impacts of subsidized security on stability and total social costs of equilibrium solutions in an N-Player game with errors
-
Zhuang, J., 2010, Impacts of subsidized security on stability and total social costs of equilibrium solutions in an N-Player game with errors, The Engineering Economist, 55(2):131-149.
-
(2010)
The Engineering Economist
, vol.55
, Issue.2
, pp. 131-149
-
-
Zhuang, J.1
-
16
-
-
38549098290
-
Balancing terrorism and natural disasters-Defensive strategy with endogenous attacker effort
-
Zhuang, J. and Bier, V. M., 2007, Balancing terrorism and natural disasters-Defensive strategy with endogenous attacker effort, Operations Research, 55(5):976-991.
-
(2007)
Operations Research
, vol.55
, Issue.5
, pp. 976-991
-
-
Zhuang, J.1
Bier, V.M.2
-
17
-
-
70350704685
-
Modeling secrecy and deception in a multiple-period attackerdefender signaling game
-
Zhuang, J., Bier, V. M., and Alagoz, O., 2010, Modeling secrecy and deception in a multiple-period attackerdefender signaling game. European Journal of Operational Research, 203(2):409-418.
-
(2010)
European Journal of Operational Research
, vol.203
, Issue.2
, pp. 409-418
-
-
Zhuang, J.1
Bier, V.M.2
Alagoz, O.3
|