Cyber-Physical Systems

Vulnerability of Transportation Networks to Traffic-Signal Tampering

Resilient Observation Selection in Adversarial Settings

Scheduling Intrusion Detection Systems in Resource-Bounded Cyber-Physical Systems

Game-Theoretic Model of Incentivizing Privacy-Aware Users to Consent to Location Tracking

A Game-Theoretic Approach for Minimizing Security Risks in the Internet-of-Things

Integrity Assurance in Resource-Bounded Systems through Stochastic Message Authentication

Designing Robust Network Topologies for Wireless Sensor Networks in Adversarial Environments

In this paper, we address the problem of deploying sink nodes in a wireless sensor network such that the resulting network topology be robust. In order to measure network robustness, we propose a new metric, called persistence, which better captures …