ResearchTrend.AI
  • Communities
  • Connect sessions
  • AI calendar
  • Organizations
  • Join Slack
  • Contact Sales
Papers
Communities
Social Events
Terms and Conditions
Pricing
Contact Sales
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2026 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1507.00576
  4. Cited By
Flip the Cloud: Cyber-Physical Signaling Games in the Presence of
  Advanced Persistent Threats
v1v2 (latest)

Flip the Cloud: Cyber-Physical Signaling Games in the Presence of Advanced Persistent Threats

2 July 2015
J. Pawlick
Sadegh Farhang
Quanyan Zhu
ArXiv (abs)PDFHTML

Papers citing "Flip the Cloud: Cyber-Physical Signaling Games in the Presence of Advanced Persistent Threats"

23 / 23 papers shown
Foundations of Cyber Resilience: The Confluence of Game, Control, and
  Learning Theories
Foundations of Cyber Resilience: The Confluence of Game, Control, and Learning Theories
Quanyan Zhu
AI4CE
391
7
0
01 Apr 2024
Decision-Dominant Strategic Defense Against Lateral Movement for 5G
  Zero-Trust Multi-Domain Networks
Decision-Dominant Strategic Defense Against Lateral Movement for 5G Zero-Trust Multi-Domain Networks
Tao Li
Yunian Pan
Quanyan Zhu
AAML
295
9
0
02 Oct 2023
Game Theory in Distributed Systems Security: Foundations, Challenges,
  and Future Directions
Game Theory in Distributed Systems Security: Foundations, Challenges, and Future DirectionsIEEE Security and Privacy (S&P), 2023
Mustafa Abdallah
S. Bagchi
S. Bopardikar
Kevin S. Chan
Xing Gao
Murat Kantarcioglu
Congmiao Li
Peng Liu
Quanyan Zhu
320
6
0
03 Sep 2023
Cybersecurity in Robotics: Challenges, Quantitative Modeling, and
  Practice
Cybersecurity in Robotics: Challenges, Quantitative Modeling, and Practice
Quanyan Zhu
Stefan Rass
Bernhard Dieber
Víctor Mayoral-Vilches
460
28
0
09 Mar 2021
Game-Theoretic and Machine Learning-based Approaches for Defensive
  Deception: A Survey
Game-Theoretic and Machine Learning-based Approaches for Defensive Deception: A Survey
Mu Zhu
Ahmed H. Anwar
Zelin Wan
Jin-Hee Cho
Charles A. Kamhoua
Munindar P. Singh
AAML
222
15
0
21 Jan 2021
FlipIn: A Game-Theoretic Cyber Insurance Framework for
  Incentive-Compatible Cyber Risk Management of Internet of Things
FlipIn: A Game-Theoretic Cyber Insurance Framework for Incentive-Compatible Cyber Risk Management of Internet of ThingsIEEE Transactions on Information Forensics and Security (IEEE TIFS), 2019
Rui Zhang
Quanyan Zhu
AAML
282
16
0
22 Nov 2019
Strategic Learning for Active, Adaptive, and Autonomous Cyber Defense
Strategic Learning for Active, Adaptive, and Autonomous Cyber Defense
Linan Huang
Quanyan Zhu
AAML
196
13
0
01 Jul 2019
Adaptive Honeypot Engagement through Reinforcement Learning of
  Semi-Markov Decision Processes
Adaptive Honeypot Engagement through Reinforcement Learning of Semi-Markov Decision ProcessesDecision and Game Theory for Security (GameSec), 2019
Linan Huang
Quanyan Zhu
AAML
289
63
0
27 Jun 2019
Game Theory for Cyber Deception: A Tutorial
Game Theory for Cyber Deception: A TutorialSymposium and Bootcamp on the Science of Security (BSS), 2019
Quanyan Zhu
252
20
0
03 Mar 2019
Multi-Layer Cyber-Physical Security and Resilience for Smart Grid
Multi-Layer Cyber-Physical Security and Resilience for Smart Grid
Quanyan Zhu
AI4CE
99
9
0
30 Sep 2018
Detection and Mitigation of Attacks on Transportation Networks as a
  Multi-Stage Security Game
Detection and Mitigation of Attacks on Transportation Networks as a Multi-Stage Security Game
Aron Laszka
W. Abbas
Yevgeniy Vorobeychik
X. Koutsoukos
AAML
253
27
0
25 Aug 2018
Game Theory Meets Network Security: A Tutorial at ACM CCS
Game Theory Meets Network Security: A Tutorial at ACM CCS
Quanyan Zhu
Stefan Rass
AAML
270
33
0
24 Aug 2018
iSTRICT: An Interdependent Strategic Trust Mechanism for the
  Cloud-Enabled Internet of Controlled Things
iSTRICT: An Interdependent Strategic Trust Mechanism for the Cloud-Enabled Internet of Controlled Things
J. Pawlick
Juntao Chen
Quanyan Zhu
280
52
0
01 May 2018
Modeling and Analysis of Leaky Deception using Signaling Games with
  Evidence
Modeling and Analysis of Leaky Deception using Signaling Games with Evidence
J. Pawlick
Edward Colbert
Quanyan Zhu
220
77
0
18 Apr 2018
A Game-Theoretic Framework for the Virtual Machines Migration Timing
  Problem
A Game-Theoretic Framework for the Virtual Machines Migration Timing ProblemIEEE Transactions on Cloud Computing (IEEE TCC), 2018
Ahmed H. Anwar
George Atia
Mina Guirguis
118
11
0
14 Mar 2018
Defense Against Advanced Persistent Threats in Dynamic Cloud Storage: A
  Colonel Blotto Game Approach
Defense Against Advanced Persistent Threats in Dynamic Cloud Storage: A Colonel Blotto Game Approach
Minghui Min
Liang Xiao
Caixia Xie
M. Hajimirsadeghi
N. Mandayam
280
54
0
19 Jan 2018
A Game-Theoretic Taxonomy and Survey of Defensive Deception for
  Cybersecurity and Privacy
A Game-Theoretic Taxonomy and Survey of Defensive Deception for Cybersecurity and Privacy
J. Pawlick
Edward Colbert
Quanyan Zhu
AAML
359
183
0
14 Dec 2017
On Game-Theoretic Risk Management (Part Three) - Modeling and
  Applications
On Game-Theoretic Risk Management (Part Three) - Modeling and Applications
Stefan Rass
63
8
0
02 Nov 2017
Optimal Timing in Dynamic and Robust Attacker Engagement During Advanced
  Persistent Threats
Optimal Timing in Dynamic and Robust Attacker Engagement During Advanced Persistent Threats
J. Pawlick
T. Nguyen
Edward Colbert
Quanyan Zhu
AAML
176
10
0
25 Jul 2017
Proactive Defense Against Physical Denial of Service Attacks using
  Poisson Signaling Games
Proactive Defense Against Physical Denial of Service Attacks using Poisson Signaling Games
J. Pawlick
Quanyan Zhu
AAML
84
15
0
10 Jul 2017
When to Invest in Security? Empirical Evidence and a Game-Theoretic
  Approach for Time-Based Security
When to Invest in Security? Empirical Evidence and a Game-Theoretic Approach for Time-Based Security
Sadegh Farhang
Jens Grossklags
51
6
0
01 Jun 2017
Phishing for Phools in the Internet of Things: Modeling One-to-Many Deception using Poisson Signaling Games
J. Pawlick
Quanyan Zhu
50
4
0
15 Mar 2017
Optimal Thresholds for Anomaly-Based Intrusion Detection in Dynamical
  Environments
Optimal Thresholds for Anomaly-Based Intrusion Detection in Dynamical Environments
Amin Ghafouri
W. Abbas
Aron Laszka
Yevgeniy Vorobeychik
X. Koutsoukos
171
43
0
21 Jun 2016
1
Page 1 of 1