2017
DOI: 10.1109/tr.2017.2759328
|View full text |Cite
|
Sign up to set email alerts
|

Dynamic Defense Resource Allocation for Minimizing Unsupplied Demand in Cyber-Physical Systems Against Uncertain Attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
14
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
9
1

Relationship

1
9

Authors

Journals

citations
Cited by 24 publications
(14 citation statements)
references
References 62 publications
0
14
0
Order By: Relevance
“…As lack of global arbitrator, the subsystems are easy to imbalance in the resources (i.e., the phenomenon of hot spot and energy hole in wireless sensor network (WSN) [14]). Moreover, the subsystems tend to make self-centered decisions for some reason, i.e., reserving energy and resources for some purposes [15], occupying more resources [16], which undermines the cooperation. What is worse, subsystems may be misled by the inconsistent information and make conflict decisions, and even harms each other's interests [17].…”
Section: A Shortages Of Current Cps Approachesmentioning
confidence: 99%
“…As lack of global arbitrator, the subsystems are easy to imbalance in the resources (i.e., the phenomenon of hot spot and energy hole in wireless sensor network (WSN) [14]). Moreover, the subsystems tend to make self-centered decisions for some reason, i.e., reserving energy and resources for some purposes [15], occupying more resources [16], which undermines the cooperation. What is worse, subsystems may be misled by the inconsistent information and make conflict decisions, and even harms each other's interests [17].…”
Section: A Shortages Of Current Cps Approachesmentioning
confidence: 99%
“…This is particularly true for cyber attacks, which are the focus of this work, since the majority of game-theoretic models assume that the defender moves first (e.g. designing a system, as in this work), and that the attacker moves after [9][10][11][12][13]. However, this means that an attacker can maximize the objective (of his/her malevolent act) and cyber attacks might be disguised from random failures, rendering the recovery difficult [14,15].…”
Section: Introductionmentioning
confidence: 99%
“…The attacks exploiting the vulnerabilities of these CPSs usually have significant impacts and serious consequences. For example, the disturbance of some vulnerable components can potentially trigger subsystem collapse, or even failure of the entire system [4,5]. Substation auto systems (SASs) are basic and important components in power CPSs.…”
Section: Introductionmentioning
confidence: 99%