共 64 条
[1]
Ahmadi M., Cubuktepe M., Jansen N., Junges S., Katoen J.-P., Topcu U., The partially observable games we play for cyber deception, (2018)
[2]
Albanese M., Battista E., Jajodia S., Deceiving attackers by creating a virtual attack surface, Cyber Deception: Building the Scientific Foundation, pp. 167-199, (2016)
[3]
Alqahtani S., Riley I., Taylor S., Gamble R., Mailler R., MTL robustness for path planning with A, Proc. 17th Int. Conf. Auton. Agents MultiAgent Syst., pp. 247-255, (2018)
[4]
Bakker C., Bhattacharya A., Chatterjee S., Vrabie D.L., Hypergames and cyber-physical security for control systems, ACM Trans. Cyber- Phys. Syst., 4, 4, pp. 1-41, (2020)
[5]
Belta C., Yordanov B., Gol E.A., Formal Methods for Discrete-Time Dynamical Systems, 89, (2017)
[6]
Bennett G.P., Hypergames: Developing a model of conflict, Futures, 12, 6, pp. 489-507, (1980)
[7]
Bennett G.P., Bussel R.R., Hypergame theory and methodology: The current “state of the art, The Management of Uncertainty: Approaches, Methods and Applications, pp. 158-181, (1986)
[8]
Bennett P., Dando M., The arms race as a hypergame: A study of routes towards a safer world, Futures, 14, 4, pp. 293-306, (1982)
[9]
Bozkurt A.K., Wang Y., Pajic M., Secure planning against stealthy attacks via model-free reinforcement learning, Proc. IEEE Int. Conf. Robot. Automat., pp. 10656-10662, (2021)
[10]
Carroll T.E., Grosu D., A game theoretic investigation of deception in network security, Secur. Commun. Netw., 4, 10, pp. 1162-1172, (2011)