Narrow your search

Library

VUB (16)

KU Leuven (11)

Odisee (11)

Thomas More Kempen (11)

Thomas More Mechelen (11)

UCLL (11)

UGent (11)

ULB (11)

ULiège (11)

VIVES (11)

More...

Resource type

book (28)

digital (10)


Language

English (31)


Year
From To Submit

2023 (2)

2022 (7)

2021 (4)

2020 (12)

2019 (5)

More...
Listing 1 - 10 of 31 << page
of 4
>>
Sort by

Book
Decision and game theory for security : 11th International Conference, GameSec 2020, College Park, MD, USA, October 28-30, 2020, proceedings
Author:
ISBN: 3030647935 3030647927 Year: 2020 Publisher: Cham, Switzerland : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of the 11th International Conference on Decision and Game Theory for Security, GameSec 2020,held in College Park, MD, USA, in October 2020. Due to COVID-19 pandemic the conference was held virtually The 21 full papers presented together with 2 short papers were carefully reviewed and selected from 29 submissions. The papers focus on machine learning and security; cyber deception; cyber-physical systems security; security of network systems; theoretic foundations of security games; emerging topics.

Keywords

Computer security. --- Artificial intelligence. --- Data encryption (Computer science). --- Computer networks --- Optical data processing. --- Computers. --- Systems and Data Security. --- Artificial Intelligence. --- Cryptology. --- Mobile and Network Security. --- Computer Imaging, Vision, Pattern Recognition and Graphics. --- Information Systems and Communication Service. --- Security measures. --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Computer systems --- Cybernetics --- Machine theory --- Calculators --- Cyberspace --- Optical computing --- Visual data processing --- Bionics --- Electronic data processing --- Integrated optics --- Photonics --- Computers --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer security --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- AI (Artificial intelligence) --- Artificial thinking --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Cognitive science --- Digital computer simulation --- Logic machines --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Computer privacy --- Computer system security --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Optical equipment --- Protection --- Security measures


Book
A Game- and Decision-Theoretic Approach to Resilient Interdependent Network Analysis and Design
Authors: ---
ISBN: 3030234436 3030234444 Year: 2020 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This brief introduces game- and decision-theoretical techniques for the analysis and design of resilient interdependent networks. It unites game and decision theory with network science to lay a system-theoretical foundation for understanding the resiliency of interdependent and heterogeneous network systems. The authors pay particular attention to critical infrastructure systems, such as electric power, water, transportation, and communications. They discuss how infrastructure networks are becoming increasingly interconnected as the integration of Internet of Things devices, and how a single-point failure in one network can propagate to other infrastructures, creating an enormous social and economic impact. The specific topics in the book include: · static and dynamic meta-network resilience game analysis and design; · optimal control of interdependent epidemics spreading over complex networks; and · applications to secure and resilient design of critical infrastructures. These topics are supported by up-to-date summaries of the authors’ recent research findings. The authors then discuss the future challenges and directions in the analysis and design of interdependent networks and explain the role of multi-disciplinary research has in computer science, engineering, public policy, and social sciences fields of study. The brief introduces new application areas in mathematics, economics, and system and control theory, and will be of interest to researchers and practitioners looking for new approaches to assess and mitigate risks in their systems and enhance their network resilience. A Game- and Decision-Theoretic Approach to Resilient Interdependent Network Analysis and Design also has self-contained chapters, which allows for multiple levels of reading by anyone with an interest in game and decision theory and network science.


Book
Cross-layer design for secure and resilient cyber-physical systems : a decision and game theoretic approach
Authors: ---
ISBN: 3030602516 3030602508 Year: 2020 Publisher: Cham, Switzerland : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book introduces a cross-layer design to achieve security and resilience for CPSs (Cyber-Physical Systems). The authors interconnect various technical tools and methods to capture the different properties between cyber and physical layers. Part II of this book bridges the gap between cryptography and control-theoretic tools. It develops a bespoke crypto-control framework to address security and resiliency in control and estimation problems where the outsourcing of computations is possible. Part III of this book bridges the gap between game theory and control theory and develops interdependent impact-aware security defense strategies and cyber-aware resilient control strategies. With the rapid development of smart cities, there is a growing need to integrate the physical systems, ranging from large-scale infrastructures to small embedded systems, with networked communications. The integration of the physical and cyber systems forms Cyber-Physical Systems (CPSs), enabling the use of digital information and control technologies to improve the monitoring, operation, and planning of the systems. Despite these advantages, they are vulnerable to cyber-physical attacks, which aim to damage the physical layer through the cyber network. This book also uses case studies from autonomous systems, communication-based train control systems, cyber manufacturing, and robotic systems to illustrate the proposed methodologies. These case studies aim to motivate readers to adopt a cross-layer system perspective toward security and resilience issues of large and complex systems and develop domain-specific solutions to address CPS challenges. A comprehensive suite of solutions to a broad range of technical challenges in secure and resilient control systems are described in this book (many of the findings in this book are useful to anyone working in cybersecurity). Researchers, professors, and advanced-level students working in computer science and engineering will find this book useful as a reference or secondary text. Industry professionals and military workers interested in cybersecurity will also want to purchase this book.


Book
Game theory for cyber deception : from theory to applications
Authors: ---
ISBN: 3030660656 3030660648 Year: 2021 Publisher: Cham, Switzerland : Birkhauser,


Book
Security and resilience of control systems : theory and applications
Authors: ---
ISBN: 3030832368 303083235X Year: 2022 Publisher: Cham, Switzerland : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book comprises a set of chapters that introduce various topics pertinent to novel approaches towards enhancing cyber-physical measures for increased security and resilience levels in control systems. The unifying theme of these approaches lies in the utilization of knowledge and models of the physical systems, rather than an attempt to reinvigorate conventional IT-based security measures. The contributing authors present perspectives on network security, game theory, and control, as well as views on how these disciplines can be combined to design resilient, safe, and secure control systems. The book explores how attacks in different forms, such as false data injections and denial-of-service can be very harmful, and may not be detected unless the security measures exploit the physical models. Several applications are discussed, power systems being considered most thoroughly. Because of its interdisciplinary nature--techniques from systems control, game theory, signal processing and computer science all make contributions--Security and Resilience of Control Systems will be of interest to academics, practitioners and graduate students with a broad spectrum of interests.


Book
Cognitive Security : A System-Scientific Approach
Authors: ---
ISBN: 3031307097 3031307089 Year: 2023 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book presents the latest research in cognitive security, a rapidly emerging field that addresses the vulnerabilities in human behavior and cognition that can lead to Cyber-Physical Systems (CPS) compromise. This book demonstrates that as adversaries increasingly use manipulative and deceptive information to disrupt human cognitive processes, including sensation, attention, memory, and mental operations, humans are misled into fallacious reasoning and manipulated decisions that can lead to system-level meltdown. Cognitive security aims to protect humans from the exploitation of cognitive vulnerabilities, help them make informed decisions that are free from manipulation and undue influence, and mitigate the aggravating risk in the ensuing steps of the attacker’s kill chain. This book offers solutions that work across different fields, such as psychology, neuroscience, data science, social science, and game theory, to deal with cognitive threats. It guides the reader through the core ideas with figures, real-life examples, and case studies. Moreover, it formally defines all research questions, presents the results using mathematical theorems and proofs, and obtains insights through numerical validation. This book provides a self-contained and brief overview of essential system-scientific tools for modeling, analyzing, and mitigating cognitive vulnerabilities. The concepts of human cognitive capacities and cognitive vulnerabilities are formally discussed, followed by two case studies in the scenarios of reactive and proactive attention vulnerabilities. This book provides insights and applications on this transdisciplinary topic, with the goal of motivating future research in this emerging area and pushing the frontier of human-technology convergence. This book is a valuable reference for researchers and advanced-level students studying or working in cognitive security and related fields. It is also useful for decision-makers, managers, and professionals working within these related fields.


Digital
Cross-Layer Design for Secure and Resilient Cyber-Physical Systems : A Decision and Game Theoretic Approach
Authors: ---
ISBN: 9783030602512 Year: 2020 Publisher: Cham Springer International Publishing

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book introduces a cross-layer design to achieve security and resilience for CPSs (Cyber-Physical Systems). The authors interconnect various technical tools and methods to capture the different properties between cyber and physical layers. Part II of this book bridges the gap between cryptography and control-theoretic tools. It develops a bespoke crypto-control framework to address security and resiliency in control and estimation problems where the outsourcing of computations is possible. Part III of this book bridges the gap between game theory and control theory and develops interdependent impact-aware security defense strategies and cyber-aware resilient control strategies. With the rapid development of smart cities, there is a growing need to integrate the physical systems, ranging from large-scale infrastructures to small embedded systems, with networked communications. The integration of the physical and cyber systems forms Cyber-Physical Systems (CPSs), enabling the use of digital information and control technologies to improve the monitoring, operation, and planning of the systems. Despite these advantages, they are vulnerable to cyber-physical attacks, which aim to damage the physical layer through the cyber network. This book also uses case studies from autonomous systems, communication-based train control systems, cyber manufacturing, and robotic systems to illustrate the proposed methodologies. These case studies aim to motivate readers to adopt a cross-layer system perspective toward security and resilience issues of large and complex systems and develop domain-specific solutions to address CPS challenges. A comprehensive suite of solutions to a broad range of technical challenges in secure and resilient control systems are described in this book (many of the findings in this book are useful to anyone working in cybersecurity). Researchers, professors, and advanced-level students working in computer science and engineering will find this book useful as a reference or secondary text. Industry professionals and military workers interested in cybersecurity will also want to purchase this book.


Multi
A Game- and Decision-Theoretic Approach to Resilient Interdependent Network Analysis and Design
Authors: ---
ISBN: 9783030234447 Year: 2020 Publisher: Cham Springer International Publishing

Loading...
Export citation

Choose an application

Bookmark

Abstract

This brief introduces game- and decision-theoretical techniques for the analysis and design of resilient interdependent networks. It unites game and decision theory with network science to lay a system-theoretical foundation for understanding the resiliency of interdependent and heterogeneous network systems. The authors pay particular attention to critical infrastructure systems, such as electric power, water, transportation, and communications. They discuss how infrastructure networks are becoming increasingly interconnected as the integration of Internet of Things devices, and how a single-point failure in one network can propagate to other infrastructures, creating an enormous social and economic impact. The specific topics in the book include: · static and dynamic meta-network resilience game analysis and design; · optimal control of interdependent epidemics spreading over complex networks; and · applications to secure and resilient design of critical infrastructures. These topics are supported by up-to-date summaries of the authors’ recent research findings. The authors then discuss the future challenges and directions in the analysis and design of interdependent networks and explain the role of multi-disciplinary research has in computer science, engineering, public policy, and social sciences fields of study. The brief introduces new application areas in mathematics, economics, and system and control theory, and will be of interest to researchers and practitioners looking for new approaches to assess and mitigate risks in their systems and enhance their network resilience. A Game- and Decision-Theoretic Approach to Resilient Interdependent Network Analysis and Design also has self-contained chapters, which allows for multiple levels of reading by anyone with an interest in game and decision theory and network science.


Multi
Game Theory for Cyber Deception : From Theory to Applications
Authors: ---
ISBN: 9783030660659 9783030660666 9783030660673 9783030660642 Year: 2021 Publisher: Cham Springer International Publishing, Imprint: Birkhäuser

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book introduces game theory as a means to conceptualize, model, and analyze cyber deception. Drawing upon a collection of deception research from the past 10 years, the authors develop a taxonomy of six species of defensive cyber deception. Three of these six species are highlighted in the context of emerging problems such as privacy against ubiquitous tracking in the Internet of things (IoT), dynamic honeynets for the observation of advanced persistent threats (APTs), and active defense against physical denial-of-service (PDoS) attacks. Because of its uniquely thorough treatment of cyber deception, this book will serve as a timely contribution and valuable resource in this active field. The opening chapters introduce both cybersecurity in a manner suitable for game theorists and game theory as appropriate for cybersecurity professionals. Chapter Four then guides readers through the specific field of defensive cyber deception. A key feature of the remaining chapters is the development of a signaling game model for the species of leaky deception featured in honeypots and honeyfiles. This model is expanded to study interactions between multiple agents with varying abilities to detect deception. Game Theory for Cyber Deception will appeal to advanced undergraduates, graduate students, and researchers interested in applying game theory to cybersecurity. It will also be of value to researchers and professionals working on cybersecurity who seek an introduction to game theory.


Multi
Cognitive Security : A System-Scientific Approach
Authors: ---
ISBN: 9783031307096 9783031307089 9783031307102 Year: 2023 Publisher: Cham Springer International Publishing

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book presents the latest research in cognitive security, a rapidly emerging field that addresses the vulnerabilities in human behavior and cognition that can lead to Cyber-Physical Systems (CPS) compromise. This book demonstrates that as adversaries increasingly use manipulative and deceptive information to disrupt human cognitive processes, including sensation, attention, memory, and mental operations, humans are misled into fallacious reasoning and manipulated decisions that can lead to system-level meltdown. Cognitive security aims to protect humans from the exploitation of cognitive vulnerabilities, help them make informed decisions that are free from manipulation and undue influence, and mitigate the aggravating risk in the ensuing steps of the attacker's kill chain. This book offers solutions that work across different fields, such as psychology, neuroscience, data science, social science, and game theory, to deal with cognitive threats. It guides the reader through the core ideas with figures, real-life examples, and case studies. Moreover, it formally defines all research questions, presents the results using mathematical theorems and proofs, and obtains insights through numerical validation. This book provides a self-contained and brief overview of essential system-scientific tools for modeling, analyzing, and mitigating cognitive vulnerabilities. The concepts of human cognitive capacities and cognitive vulnerabilities are formally discussed, followed by two case studies in the scenarios of reactive and proactive attention vulnerabilities. This book provides insights and applications on this transdisciplinary topic, with the goal of motivating future research in this emerging area and pushing the frontier of human-technology convergence. This book is a valuable reference for researchers and advanced-level students studying or working in cognitive security and related fields. It is also useful for decision-makers, managers, and professionals working within these related fields.

Listing 1 - 10 of 31 << page
of 4
>>
Sort by