Constrained Differential Games for Secure Decision-Making Against Stealthy Attacks.
Filippos FotiadisAris KanellopoulosKyriakos G. VamvoudakisPublished in: ACC (2020)
Keyphrases
- decision making
- cryptographic protocols
- secure routing
- stream cipher
- security protocols
- chosen plaintext
- security mechanisms
- bounded rationality
- security measures
- security flaws
- multi agent decision making
- decision makers
- countermeasures
- block cipher
- cryptographic algorithms
- game playing
- remote user authentication scheme
- unauthorized access
- decision process
- decision support system
- information leakage
- computer games
- authentication scheme
- game theory
- game design
- security properties
- coalitional games
- security analysis
- security requirements
- decision support
- sql injection
- game theoretic
- advanced encryption standard
- security issues
- security management
- security threats
- data mining
- authentication protocol
- sensitive data
- multi party
- resource constrained
- key management
- game play
- watermarking scheme