In this paper,we propose a game theory framework to solve advanced persistent threat problems,especially considering two types of insider threats:malicious and *** this framework,we establish a unified three-player ga...
详细信息
In this paper,we propose a game theory framework to solve advanced persistent threat problems,especially considering two types of insider threats:malicious and *** this framework,we establish a unified three-player game model and derive Nash equilibria in response to different types of insider *** analyzing these Nash equilibria,we provide quantitative solutions to advanced persistent threat problems pertaining to insider ***,we have conducted a comparative assessment of the optimal defense strategy and corresponding defender's costs between two types of insider ***,our findings advocate a more proactive defense strategy against inadvertent insider threats in contrast to malicious ones,despite the latter imposing a higher burden on the *** theoretical results are substantiated by numerical results,which additionally include a detailed exploration of the conditions under which different insiders adopt risky *** conditions can serve as guiding indicators for the defender when calibrating their monitoring intensities and devising defensive strategies.
Network data analytics function (NWDAF), introduced to provision data analytics and machine learning model training in the 5G core network, is expected to be an essential functional entity and play a significant role ...
详细信息
Planning and managing a power grid relies heavily on accurate predictions of future load. Operational choices involving resource utilization, infrastructural management, implementation schedule planning, investment pl...
详细信息
As power systems evolve and increasingly rely on digital technology, they become more vulnerable to both cyber and physical threats. This paper explores the growing challenges faced by modern power grids, particularly...
详细信息
We present an information-theoretic lower bound for the problem of parameter estimation with time-uniform coverage guarantees. Via a new a reduction to sequential testing, we obtain stronger lower bounds that capture ...
详细信息
This paper presents a comprehensive approach to enhancing autonomous docking maneuvers through machine visual perception and sim-to-real transfer learning. By leveraging relative vectoring techniques, we aim to replic...
详细信息
The advantages of step-up/down series partial power converters (S-PPCs) are comprehensively addressed in the literature. However, their functionality at the critical point of equal port voltages is neglected. This pap...
详细信息
The proposed self-excitation scheme uses a two-inverter-fed third harmonic current to generate and control a harmonic magnetic field in the airgap for self-excitation through voltage induction in a rotor-mounted harmo...
详细信息
This paper proposes a novel adaptive synthetic inertia (SI) control scheme for the battery energy storage system (BESS) in the wind farm. The proposed approach dynamically adjusts the amplitude of the direct current (...
详细信息
The advent of Large Language Models (LLMs) has revolutionized language understanding and human-like text generation, drawing interest from many other fields with this question in mind: What else are the LLMs capable o...
详细信息
暂无评论