- Home
- Search Results
- Page 1 of 1
Search for: All records
-
Total Resources3
- Resource Type
-
0001000002000000
- More
- Availability
-
30
- Author / Contributor
- Filter by Author / Creator
-
-
Bhattacharya, Arnab (3)
-
Banik, Sandeep (1)
-
Bopardikar, Shaunak D. (1)
-
Crider, Yoshika S. (1)
-
Cuadros Olave, John (1)
-
Haik, Daniel (1)
-
Hamidi, Youssef K. (1)
-
Jafari, Omid (1)
-
Kwong, Laura H. (1)
-
LeBoa, Christopher (1)
-
LeMesurier, Roger (1)
-
Mansfield, Samuel A. (1)
-
Nagarkar, Parth (1)
-
Patterson, Jonathan (1)
-
Phalen, Robert N. (1)
-
Pitchik, Helen O. (1)
-
Qazi, Alliya S. (1)
-
Ramachandran, Thiagarajan (1)
-
Shless, Jared S. (1)
-
Styczynski, Ashley (1)
-
- Filter by Editor
-
-
& Spizer, S. M. (0)
-
& . Spizer, S. (0)
-
& Ahn, J. (0)
-
& Bateiha, S. (0)
-
& Bosch, N. (0)
-
& Brennan K. (0)
-
& Brennan, K. (0)
-
& Chen, B. (0)
-
& Chen, Bodong (0)
-
& Drown, S. (0)
-
& Ferretti, F. (0)
-
& Higgins, A. (0)
-
& J. Peters (0)
-
& Kali, Y. (0)
-
& Ruiz-Arias, P.M. (0)
-
& S. Spitzer (0)
-
& Sahin. I. (0)
-
& Spitzer, S. (0)
-
& Spitzer, S.M. (0)
-
(submitted - in Review for IEEE ICASSP-2024) (0)
-
-
Have feedback or suggestions for a way to improve these results?
!
Note: When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher.
Some full text articles may not yet be available without a charge during the embargo (administrative interval).
What is a DOI Number?
Some links on this page may take you to non-federal websites. Their policies may differ from this site.
-
Security of cyber-physical systems (CPS) continues to pose new challenges due to the tight integration and operational complexity of the cyber and physical components. To address these challenges, this article presents a domain-aware, optimization-based approach to determine an effective defense strategy for CPS in an automated fashion—by emulating a strategic adversary in the loop that exploits system vulnerabilities, interconnection of the CPS, and the dynamics of the physical components. Our approach builds on an adversarial decision-making model based on a Markov Decision Process (MDP) that determines the optimal cyber (discrete) and physical (continuous) attack actions over a CPS attack graph. The defense planning problem is modeled as a non-zero-sum game between the adversary and defender. We use a model-free reinforcement learning method to solve the adversary’s problem as a function of the defense strategy. We then employ Bayesian optimization (BO) to find an approximatebest-responsefor the defender to harden the network against the resulting adversary policy. This process is iterated multiple times to improve the strategy for both players. We demonstrate the effectiveness of our approach on a ransomware-inspired graph with a smart building system as the physical process. Numerical studies show that our method converges to a Nash equilibrium for various defender-specific costs of network hardening.more » « less
-
Nagarkar, Parth; Bhattacharya, Arnab; Jafari, Omid (, Proceedings of the 8th ACMIKDD CODS and 26th COMAD,CODS COMAD 2021)
-
Phalen, Robert N.; Patterson, Jonathan; Cuadros Olave, John; Mansfield, Samuel A.; Shless, Jared S.; Crider, Yoshika S.; Pitchik, Helen O.; Qazi, Alliya S.; Styczynski, Ashley; LeMesurier, Roger; et al (, Journal of Occupational and Environmental Hygiene)
An official website of the United States government
