These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

145 related articles for article (PubMed ID: 31899439)

  • 1. A Learning-Based Solution for an Adversarial Repeated Game in Cyber-Physical Power Systems.
    Paul S; Ni Z; Mu C
    IEEE Trans Neural Netw Learn Syst; 2020 Nov; 31(11):4512-4523. PubMed ID: 31899439
    [TBL] [Abstract][Full Text] [Related]  

  • 2. A Multistage Game in Smart Grid Security: A Reinforcement Learning Solution.
    Ni Z; Paul S
    IEEE Trans Neural Netw Learn Syst; 2019 Sep; 30(9):2684-2695. PubMed ID: 30624227
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Multistage Attack-Defense Graph Game Analysis for Protection Resources Allocation Optimization Against Cyber Attacks Considering Rationality Evolution.
    Shao C; Li YF
    Risk Anal; 2022 May; 42(5):1086-1105. PubMed ID: 34636067
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Adversarial Risk Analysis to Allocate Optimal Defense Resources for Protecting Cyber-Physical Systems from Cyber Attacks.
    Wang W; Di Maio F; Zio E
    Risk Anal; 2019 Dec; 39(12):2766-2785. PubMed ID: 31361041
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Defense of Cyber Infrastructures Against Cyber-Physical Attacks Using Game-Theoretic Models.
    Rao NS; Poole SW; Ma CY; He F; Zhuang J; Yau DK
    Risk Anal; 2016 Apr; 36(4):694-710. PubMed ID: 25847370
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Towards an Iterated Game Model with Multiple Adversaries in Smart-World Systems.
    He X; Yang X; Yu W; Lin J; Yang Q
    Sensors (Basel); 2018 Feb; 18(2):. PubMed ID: 29495291
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Game Theoretic Honeypot Deployment in Smart Grid.
    Diamantoulakis P; Dalamagkas C; Radoglou-Grammatikis P; Sarigiannidis P; Karagiannidis G
    Sensors (Basel); 2020 Jul; 20(15):. PubMed ID: 32731595
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Rule-Based Detection of False Data Injections Attacks against Optimal Power Flow in Power Systems.
    Umar S; Felemban M
    Sensors (Basel); 2021 Apr; 21(7):. PubMed ID: 33918446
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Defender-Attacker Games with Asymmetric Player Utilities.
    Zhai Q; Peng R; Zhuang J
    Risk Anal; 2020 Feb; 40(2):408-420. PubMed ID: 31529803
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Cyber-physical security of Wide-Area Monitoring, Protection and Control in a smart grid environment.
    Ashok A; Hahn A; Govindarasu M
    J Adv Res; 2014 Jul; 5(4):481-9. PubMed ID: 25685516
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Game-Theoretic Decision Support for Cyber Forensic Investigations.
    Nisioti A; Loukas G; Rass S; Panaousis E
    Sensors (Basel); 2021 Aug; 21(16):. PubMed ID: 34450740
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Security under Uncertainty: Adaptive Attackers Are More Challenging to Human Defenders than Random Attackers.
    Moisan F; Gonzalez C
    Front Psychol; 2017; 8():982. PubMed ID: 28690557
    [TBL] [Abstract][Full Text] [Related]  

  • 13. A General Framework for the Assessment of Power System Vulnerability to Malicious Attacks.
    Piccinelli R; Sansavini G; Lucchetti R; Zio E
    Risk Anal; 2017 Nov; 37(11):2182-2190. PubMed ID: 28230257
    [TBL] [Abstract][Full Text] [Related]  

  • 14. A Game-Theoretic Approach to Information-Flow Control via Protocol Composition.
    Alvim MS; Chatzikokolakis K; Kawamoto Y; Palamidessi C
    Entropy (Basel); 2018 May; 20(5):. PubMed ID: 33265472
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Attacker-defender game from a network science perspective.
    Li YP; Tan SY; Deng Y; Wu J
    Chaos; 2018 May; 28(5):051102. PubMed ID: 29857681
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Analysis of false data injection attacks in power systems: A dynamic Bayesian game-theoretic approach.
    Tian M; Dong Z; Wang X
    ISA Trans; 2021 Sep; 115():108-123. PubMed ID: 33461739
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Detection Games under Fully Active Adversaries.
    Tondi B; Merhav N; Barni M
    Entropy (Basel); 2018 Dec; 21(1):. PubMed ID: 33266739
    [TBL] [Abstract][Full Text] [Related]  

  • 18. A Secure Control Learning Framework for Cyber-Physical Systems Under Sensor and Actuator Attacks.
    Zhou Y; Vamvoudakis KG; Haddad WM; Jiang ZP
    IEEE Trans Cybern; 2021 Sep; 51(9):4648-4660. PubMed ID: 32735543
    [TBL] [Abstract][Full Text] [Related]  

  • 19. An attack-defense game model in infrastructure networks under link hiding.
    Qi G; Li J; Xu X; Chen G; Yang K
    Chaos; 2022 Nov; 32(11):113109. PubMed ID: 36456310
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Randomized Prediction Games for Adversarial Machine Learning.
    Rota Bulo S; Biggio B; Pillai I; Pelillo M; Roli F
    IEEE Trans Neural Netw Learn Syst; 2017 Nov; 28(11):2466-2478. PubMed ID: 27514067
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 8.