共 20 条
[1]
Abdallah M, 2022, P IEEE S SECUR PRIV, P249, DOI [10.1109/SP46214.2022.9833591, 10.1109/SP46214.2022.00106]
[2]
Behavioral and Game-Theoretic Security Investments in Interdependent Systems Modeled by Attack Graphs
[J].
IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS,
2020, 7 (04)
:1585-1596
[3]
[Anonymous], 2010, Network Security: A Decision and GameTheoretic Approach
[4]
Bensoussan A, 2010, LECT NOTES COMPUT SC, V6442, P135, DOI 10.1007/978-3-642-17197-0_9
[6]
Deceptive Reinforcement Learning Under Adversarial Manipulations on Cost Signals
[J].
DECISION AND GAME THEORY FOR SECURITY,
2019, 11836
:217-237
[7]
Cyber-Physical Systems Security-A Survey
[J].
IEEE INTERNET OF THINGS JOURNAL,
2017, 4 (06)
:1802-1831

