Publisher
Springer International Publishing
Reference72 articles.
1. Alpcan T, Basar T (2004) A game theoretic analysis of intrusion detection in access control systems. In: Decision and control, 2004. CDC. 43rd IEEE conference on, vol 2. IEEE, pp 1568–1573
2. Basar T (1983) The gaussian test channel with an intelligent jammer. IEEE Trans Inf Theory 29(1):152–157
3. Chen J, Zhu Q (2016) Interdependent network formation games with an application to critical infrastructures. In: American control conference (ACC). IEEE, pp 2870–2875.
http://ieeexplore.ieee.org/abstract/document/7525354/
4. Chen J, Touati C, Zhu Q (2019) Optimal secure two-layer iot network design. IEEE Trans Control Netw Syst 1–1.
https://doi.org/10.1109/TCNS.2019.2906893
5. Chen J, Touati C, Zhu Q (2020) A dynamic game approach to strategic design of secure and resilient infrastructure network. IEEE Trans Inf Forensics Secur 15:462–474.
https://doi.org/10.1109/TIFS.2019.2924130