{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T04:53:28Z","timestamp":1729659208309,"version":"3.28.0"},"reference-count":33,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,6,1]],"date-time":"2020-06-01T00:00:00Z","timestamp":1590969600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,6,1]],"date-time":"2020-06-01T00:00:00Z","timestamp":1590969600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,6,1]],"date-time":"2020-06-01T00:00:00Z","timestamp":1590969600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,6]]},"DOI":"10.1109\/cns48642.2020.9162219","type":"proceedings-article","created":{"date-parts":[[2020,8,7]],"date-time":"2020-08-07T21:54:40Z","timestamp":1596837280000},"page":"1-9","source":"Crossref","is-referenced-by-count":0,"title":["DeepBLOC: A Framework for Securing CPS through Deep Reinforcement Learning on Stochastic Games"],"prefix":"10.1109","author":[{"given":"Alireza","family":"Tahsini","sequence":"first","affiliation":[]},{"given":"Noah","family":"Dunstatter","sequence":"additional","affiliation":[]},{"given":"Mina","family":"Guirguis","sequence":"additional","affiliation":[]},{"given":"Chuadhry Mujeeb","family":"Ahmed","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/MCS.2014.2364710"},{"key":"ref32","article-title":"Stackelberg-game analysis of correlated attacks in cyber-physical systems","author":"zhu","year":"2011","journal-title":"In American Control Conference"},{"journal-title":"A Cyberattack Has Caused Confirmed Physical Damage for the Second Time Ever","year":"2015","author":"zetter","key":"ref31"},{"key":"ref30","article-title":"Stabilization of Networked Control Systems with Data Packet Dropout and Network Delays via Switching System Approach","author":"yu","year":"2004","journal-title":"IEEE CDC"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2664243.2664277"},{"key":"ref11","article-title":"Fictitious self-play in extensive-form games","author":"heinrich","year":"2015","journal-title":"In International Conference on Machine Learning"},{"key":"ref12","article-title":"Deep reinforcement learning from self-play in imperfect-information games","author":"heinrich","year":"2016","journal-title":"arXiv preprint arXiv 1603 01840"},{"key":"ref13","first-page":"4190","article-title":"A unified game-theoretic approach to multiagent reinforcement learning","author":"lanctot","year":"2017","journal-title":"In Advances in Neural Information Processing Systems"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2015.2461851"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/B978-1-55860-335-6.50027-1"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-0417(01)00015-8"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653666"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"789","DOI":"10.1016\/S0005-1098(99)00214-9","article-title":"Constrained model predictive control: Stability and optimality","volume":"36","author":"mayne","year":"2000","journal-title":"Automatica"},{"key":"ref19","article-title":"Playing atari with deep reinforcement learning","author":"mnih","year":"2013","journal-title":"arXiv preprint arXiv 1312 5602"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978388"},{"key":"ref4","article-title":"Iterative solution of games by fictitious play","author":"brown","year":"1951","journal-title":"Activity Analysis of Production and Allocation"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/2566468.2566484"},{"key":"ref3","article-title":"Detecting False Data Injection Attacks on DC State Estimation","author":"bobba","year":"2010","journal-title":"Workshop on Secure Control Systems CPS Week"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3057268"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11212-1_23"},{"key":"ref5","doi-asserted-by":"crossref","DOI":"10.1609\/aaai.v30i1.10023","article-title":"One Size Does Not Fit All: A Game-Theoretic Approach for Dynamically and Effectively Screening for Threats","author":"brown","year":"2016","journal-title":"AAAI Conference"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2018.8433145"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2015.2440095"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00602-9_3"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2002.1184678"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274748"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"529","DOI":"10.1038\/nature14236","article-title":"Human-level control through deep reinforcement learning","volume":"518","author":"mnih","year":"2015","journal-title":"Nature"},{"journal-title":"Cyberattack Hits Ukraine Then Spreads Internationally","year":"2017","author":"perlroth","key":"ref22"},{"key":"ref21","article-title":"False Data Injection Attacks in Control Systems","author":"mo","year":"2010","journal-title":"Proc 1st Workshop Secure Control Syst"},{"key":"ref24","first-page":"19","article-title":"From Physical Security to Cybersecurity","volume":"1","author":"sinha","year":"2015","journal-title":"Cybersecurity"},{"key":"ref23","first-page":"163","volume":"95","author":"schenato","year":"2007","journal-title":"Foundation of Control and Estimation over Lossy Networks"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/2566468.2566483"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2004.834121"}],"event":{"name":"2020 IEEE Conference on Communications and Network Security (CNS)","start":{"date-parts":[[2020,6,29]]},"location":"Avignon, France","end":{"date-parts":[[2020,7,1]]}},"container-title":["2020 IEEE Conference on Communications and Network Security (CNS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9153729\/9162157\/09162219.pdf?arnumber=9162219","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,5]],"date-time":"2023-10-05T12:46:00Z","timestamp":1696509960000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9162219\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,6]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/cns48642.2020.9162219","relation":{},"subject":[],"published":{"date-parts":[[2020,6]]}}}