{"id":"https://openalex.org/W2892303285","doi":"https://doi.org/10.1145/3305218.3305239","title":"Adaptive Strategic Cyber Defense for Advanced Persistent Threats in Critical Infrastructure Networks","display_name":"Adaptive Strategic Cyber Defense for Advanced Persistent Threats in Critical Infrastructure Networks","publication_year":2019,"publication_date":"2019-01-17","ids":{"openalex":"https://openalex.org/W2892303285","doi":"https://doi.org/10.1145/3305218.3305239","mag":"2892303285"},"language":"en","primary_location":{"id":"doi:10.1145/3305218.3305239","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3305218.3305239","pdf_url":null,"source":{"id":"https://openalex.org/S4210187660","display_name":"ACM SIGMETRICS Performance Evaluation Review","issn_l":"0163-5999","issn":["0163-5999","1557-9484"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM SIGMETRICS Performance Evaluation Review","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5089244984","display_name":"Linan Huang","orcid":"https://orcid.org/0000-0003-1591-8749"},"institutions":[{"id":"https://openalex.org/I57206974","display_name":"New York University","ror":"https://ror.org/0190ak572","country_code":"US","type":"education","lineage":["https://openalex.org/I57206974"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Linan Huang","raw_affiliation_strings":["New York University, Brooklyn, NY, USA"],"affiliations":[{"raw_affiliation_string":"New York University, Brooklyn, NY, USA","institution_ids":["https://openalex.org/I57206974"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5081500464","display_name":"Quanyan Zhu","orcid":"https://orcid.org/0000-0002-0008-2953"},"institutions":[{"id":"https://openalex.org/I57206974","display_name":"New York University","ror":"https://ror.org/0190ak572","country_code":"US","type":"education","lineage":["https://openalex.org/I57206974"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Quanyan Zhu","raw_affiliation_strings":["New York University, Brooklyn, NY, USA"],"affiliations":[{"raw_affiliation_string":"New York University, Brooklyn, NY, USA","institution_ids":["https://openalex.org/I57206974"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5089244984"],"corresponding_institution_ids":["https://openalex.org/I57206974"],"apc_list":null,"apc_paid":null,"fwci":9.8126,"has_fulltext":false,"cited_by_count":85,"citation_normalized_percentile":{"value":0.98551896,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":100},"biblio":{"volume":"46","issue":"2","first_page":"52","last_page":"56"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11807","display_name":"Infrastructure Resilience and Vulnerability Analysis","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/2205","display_name":"Civil and Structural Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/bayesian-game","display_name":"Bayesian game","score":0.777168869972229},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7474228143692017},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6297339200973511},{"id":"https://openalex.org/keywords/nash-equilibrium","display_name":"Nash equilibrium","score":0.5346155762672424},{"id":"https://openalex.org/keywords/state-space","display_name":"State space","score":0.5069380402565002},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.49607476592063904},{"id":"https://openalex.org/keywords/complete-information","display_name":"Complete information","score":0.49537718296051025},{"id":"https://openalex.org/keywords/sequential-game","display_name":"Sequential game","score":0.4737188220024109},{"id":"https://openalex.org/keywords/game-theory","display_name":"Game theory","score":0.45633241534233093},{"id":"https://openalex.org/keywords/stochastic-game","display_name":"Stochastic game","score":0.42048943042755127},{"id":"https://openalex.org/keywords/mathematical-optimization","display_name":"Mathematical optimization","score":0.3099820613861084},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.27100086212158203},{"id":"https://openalex.org/keywords/mathematical-economics","display_name":"Mathematical economics","score":0.15197408199310303},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.09538209438323975}],"concepts":[{"id":"https://openalex.org/C200594392","wikidata":"https://www.wikidata.org/wiki/Q812529","display_name":"Bayesian game","level":4,"score":0.777168869972229},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7474228143692017},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6297339200973511},{"id":"https://openalex.org/C46814582","wikidata":"https://www.wikidata.org/wiki/Q23389","display_name":"Nash equilibrium","level":2,"score":0.5346155762672424},{"id":"https://openalex.org/C72434380","wikidata":"https://www.wikidata.org/wiki/Q230930","display_name":"State space","level":2,"score":0.5069380402565002},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.49607476592063904},{"id":"https://openalex.org/C113336015","wikidata":"https://www.wikidata.org/wiki/Q574010","display_name":"Complete information","level":2,"score":0.49537718296051025},{"id":"https://openalex.org/C73795354","wikidata":"https://www.wikidata.org/wiki/Q287618","display_name":"Sequential game","level":3,"score":0.4737188220024109},{"id":"https://openalex.org/C177142836","wikidata":"https://www.wikidata.org/wiki/Q44455","display_name":"Game theory","level":2,"score":0.45633241534233093},{"id":"https://openalex.org/C22171661","wikidata":"https://www.wikidata.org/wiki/Q1074380","display_name":"Stochastic game","level":2,"score":0.42048943042755127},{"id":"https://openalex.org/C126255220","wikidata":"https://www.wikidata.org/wiki/Q141495","display_name":"Mathematical optimization","level":1,"score":0.3099820613861084},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.27100086212158203},{"id":"https://openalex.org/C144237770","wikidata":"https://www.wikidata.org/wiki/Q747534","display_name":"Mathematical economics","level":1,"score":0.15197408199310303},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.09538209438323975},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3305218.3305239","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3305218.3305239","pdf_url":null,"source":{"id":"https://openalex.org/S4210187660","display_name":"ACM SIGMETRICS Performance Evaluation Review","issn_l":"0163-5999","issn":["0163-5999","1557-9484"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM SIGMETRICS Performance Evaluation Review","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","score":0.6200000047683716,"display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":10,"referenced_works":["https://openalex.org/W2015787697","https://openalex.org/W2026959869","https://openalex.org/W2067064328","https://openalex.org/W2139774323","https://openalex.org/W2143288231","https://openalex.org/W2761450937","https://openalex.org/W2762121107","https://openalex.org/W2793451519","https://openalex.org/W2893194684","https://openalex.org/W4250744658"],"related_works":["https://openalex.org/W2943794307","https://openalex.org/W2978746232","https://openalex.org/W2011350055","https://openalex.org/W2390503811","https://openalex.org/W2162110047","https://openalex.org/W2801962073","https://openalex.org/W3145835819","https://openalex.org/W1533945010","https://openalex.org/W4385016018","https://openalex.org/W2890099238"],"abstract_inverted_index":{"Advanced":[0],"Persistent":[1],"Threats":[2],"(APTs)":[3],"have":[4],"created":[5],"new":[6],"security":[7,78],"challenges":[8],"for":[9],"critical":[10],"infrastructures":[11],"due":[12],"to":[13,25,37,110,138,152,182,222],"their":[14,45,158],"stealthy,":[15],"dynamic,":[16],"and":[17,44,64,75,89,115,147,155,164,189,199,212],"adaptive":[18],"natures.":[19],"In":[20],"this":[21],"work,":[22],"we":[23],"aim":[24],"lay":[26],"a":[27,32,59,65,112,135,233],"game-theoretic":[28],"foundation":[29],"by":[30],"establishing":[31],"multi-stage":[33],"Bayesian":[34,54,91],"game":[35,142],"framework":[36],"capture":[38],"incomplete":[39],"information":[40,145],"of":[41,51,61,67,86,176,186],"deceptive":[42,156],"APTs":[43,150],"multistage":[46],"multi-phase":[47],"movement.":[48],"The":[49,98,125,173],"analysis":[50],"the":[52,73,77,87,105,121,140,144,161,169,177,180,184,187,205,209,213,219,230],"perfect":[53],"Nash":[55],"equilibrium":[56,117],"(PBNE)":[57],"enables":[58],"prediction":[60],"attacker's":[62,220],"behaviors":[63,198],"design":[66],"defensive":[68,192],"strategies":[69],"that":[70,149,194],"can":[71,195],"deter":[72],"adversaries":[74],"mitigate":[76,200],"risks.":[79],"A":[80],"conjugate-prior":[81],"method":[82],"allows":[83,179],"online":[84,174],"computation":[85,109],"belief":[88,178],"reduces":[90],"update":[92,175],"into":[93,104],"an":[94,224],"iterative":[95],"parameter":[96],"update.":[97],"forwardly":[99],"updated":[100],"parameters":[101],"are":[102],"assimilated":[103],"backward":[106],"dynamic":[107,141],"programming":[108],"characterize":[111],"computationally":[113],"tractable":[114],"timeconsistent":[116],"solution":[118],"based":[119],"on":[120],"expanded":[122],"state":[123,227],"space.":[124],"Tennessee":[126],"Eastman":[127],"(TE)":[128],"process":[129],"control":[130],"problem":[131],"is":[132],"used":[133],"as":[134,216,218],"case":[136],"study":[137],"demonstrate":[139],"under":[143],"asymmetry":[146],"show":[148],"tend":[151],"be":[153],"stealthy":[154],"during":[157],"transitions":[159],"in":[160],"cyber":[162],"layer":[163],"behave":[165],"aggressively":[166],"when":[167],"reaching":[168],"targeted":[170],"physical":[171],"plant.":[172],"defender":[181,231],"learn":[183],"behavior":[185],"attacker":[188],"choose":[190],"strategic":[191],"actions":[193],"thwart":[196],"adversarial":[197],"APTs.":[201],"Numerical":[202],"results":[203],"illustrate":[204],"defender's":[206],"tradeoff":[207],"between":[208],"immediate":[210],"reward":[211],"future":[214],"expectation":[215],"well":[217],"goal":[221],"reach":[223],"advantageous":[225],"system":[226],"while":[228],"making":[229],"form":[232],"positive":[234],"belief.":[235]},"counts_by_year":[{"year":2025,"cited_by_count":11},{"year":2024,"cited_by_count":5},{"year":2023,"cited_by_count":9},{"year":2022,"cited_by_count":7},{"year":2021,"cited_by_count":18},{"year":2020,"cited_by_count":17},{"year":2019,"cited_by_count":17},{"year":2018,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
