How to cite this paper
Zarreh, A., Zarreh, M., Wan, H & Saygin, C. (2025). Optimizing cybersecurity in cyber-physical manufacturing systems: A game-theoretic approach and quantal response equilibrium study.Journal of Future Sustainability, 5(3), 179-194.
Refrences
Adamson, G., Wang, L., Holm, M., & Moore, P. (2017). Cloud manufacturing–a critical review of recent development and future trends. International Journal of Computer Integrated Manufacturing, 30(4–5), 347–380.
Aghakhani, S., Pourmand, P., & Zarreh, M. (2023). A Mathematical Optimization Model for the Pharmaceutical Waste Lo-cation‐Routing Problem Using Genetic Algorithm and Particle Swarm Optimization. Mathematical Problems in Engineer-ing, 2023(1), 6165495.
Ait Temghart, A., Marwan, M., & Baslam, M. (2023). Stackelberg Security Game for Optimizing Cybersecurity Decisions in Cloud Computing. Security and Communication Networks, 2023(1), 2811038.
Ali, S., Balushi, T. A., Nadir, Z., & Hussain, O. K. (2018). ICS/SCADA System Security for CPS. In Cyber Security for Cyber Physical Systems (pp. 89–113). Springer, Cham. https://doi.org/10.1007/978-3-319-75880-0_5
Ani, U. P. D., He, H., & Tiwari, A. (2017). Review of cybersecurity issues in industrial critical infrastructure: Manufacturing in perspective. Journal of Cyber Security Technology, 1(1), 32–74.
Bagheri, B., Yang, S., Kao, H.-A., & Lee, J. (2015). Cyber-physical Systems Architecture for Self-Aware Machines in Indus-try 4.0 Environment. IFAC-PapersOnLine, 48(3), 1622–1627. https://doi.org/10.1016/j.ifacol.2015.06.318
Banik, S., Ramachandran, T., Bhattacharya, A., & Bopardikar, S. D. (2023). Automated Adversary-in-the-Loop Cyber-Physical Defense Planning. ACM Transactions on Cyber-Physical Systems, 7(3), 1–25.
Banitaba, F. S., Aygun, S., & Najafi, M. H. (2024). Late Breaking Results: Fortifying Neural Networks: Safeguarding Against Adversarial Attacks with Stochastic Computing. arXiv Preprint arXiv:2407.04861.
Bouzary, H., & Chen, F. F. (2018). Service optimal selection and composition in cloud manufacturing: A comprehensive survey. The International Journal of Advanced Manufacturing Technology, 1–14.
Bouzary, H., & Chen, F. F. (2019). A hybrid grey wolf optimizer algorithm with evolutionary operators for optimal QoS-aware service composition and optimal selection in cloud manufacturing. The International Journal of Advanced Manu-facturing Technology, 101(9–12), 2771–2784.
Cardenas, A., Amin, S., Sinopoli, B., Giani, A., Perrig, A., & Sastry, S. (2009). Challenges for securing cyber physical sys-tems. Workshop on Future Directions in Cyber-Physical Systems Security, 5. https://pdfs.semanticscholar.org/d514/97e5827cc00d9d00c26e27a769d42284cfba.pdf
Coffey, K., Maglaras, L. A., Smith, R., Janicke, H., Ferrag, M. A., Derhab, A., Mukherjee, M., Rallis, S., & Yousaf, A. (2018). Vulnerability Assessment of Cyber Security for SCADA Systems. In S. Parkinson, A. Crampton, & R. Hill (Eds.), Guide to Vulnerability Analysis for Computer Networks and Systems: An Artificial Intelligence Approach (pp. 59–80). Springer International Publishing. https://doi.org/10.1007/978-3-319-92624-7_3
Cook, A., Smith, R., Maglaras, L., & Janicke, H. (2016). Measuring the risk of cyber attack in industrial control systems.
Cyber risk in advanced manufacturing | Deloitte US. (2017). Deloitte United States. https://www2.deloitte.com/us/en/pages/manufacturing/articles/cyber-risk-in-advanced-manufacturing.html
DBIR: Understand Your Cybersecurity Threats. (2017). Verizon Enterprise Solutions. http://www.verizonenterprise.com/verizon-insights-lab/dbir/2017/
DeSmit, Z., Kulkarni, A. U., & Wernz, C. (2018). Enhancing cyber-physical security in manufacturing through game-theoretic analysis. Cyber-Physical Systems, 4(4), 232–259.
Dutta, P. K. (1999). Strategies and games: Theory and practice. MIT press.
Fadavi, N. (2024). Dynamic Price Dispersion of Seasonal Goods in Bertrand–Edgeworth Competition. Applied Economics and Finance, 11(2), 14–33.
Ferrari, P., Sisinni, E., Bellagente, P., Rinaldi, S., Pasetti, M., de Sá, A. O., Machado, R. C., Carmo, L. F. da C., & Casimiro, A. (2020). Model-based stealth attack to networked control system based on real-time Ethernet. IEEE Transactions on Industrial Electronics, 68(8), 7672–7683.
Gao, S., Zhang, H., Wang, Z., Huang, C., & Yan, H. (2022). Optimal injection attack strategy for cyber-physical systems under resource constraint: A game approach. IEEE Transactions on Control of Network Systems, 10(2), 636–646.
Ge, Y., & Zhu, Q. (2023). Gazeta: Game-theoretic zero-trust authentication for defense against lateral movement in 5g iot networks. IEEE Transactions on Information Forensics and Security.
Goeree, J. K., Holt, C. A., & Palfrey, T. R. (2016). Quantal Response Equilibrium: A Stochastic Theory of Games. Princeton University Press.
Henze, M., Hiller, J., Hummen, R., Matzutt, R., Wehrle, K., & Ziegeldorf, J. H. (2017). Network Security and Privacy for Cyber-Physical Systems. Security and Privacy in Cyber-Physical Systems: Foundations, Principles and Applications, H. Song, GA Fink, and S. Jeschke (Eds.).
Hu, H., Liu, Y., Chen, C., Zhang, H., & Liu, Y. (2020). Optimal decision making approach for cyber security defense using evolutionary game. IEEE Transactions on Network and Service Management, 17(3), 1683–1700.
Hu, Y., Zhang, H., Guo, Y., Li, T., & Ma, J. (2020). A Novel Attack‐and‐Defense Signaling Game for Optimal Deceptive Defense Strategy Choice. Wireless Communications and Mobile Computing, 2020(1), 8850356.
J Bayuk, D Cavit, E Guerrino, J Mahony, B McDowell, & P. Staarfanger. (2011). Malware risks and mitigation report (BITS Financial Services Roundtable).
Jakovljevic, Z., Majstorovic, V., Stojadinovic, S., Zivkovic, S., Gligorijevic, N., & Pajic, M. (2017). Cyber-Physical Manu-facturing Systems (CPMS). In V. Majstorovic & Z. Jakovljevic (Eds.), Proceedings of 5th International Conference on Advanced Manufacturing Engineering and Technologies (pp. 199–214). Springer International Publishing.
Joel Sobel. (n.d.). Linear Programming Notes IX: Two-Person Zero-Sum Game Theory. https://econweb.ucsd.edu/~jsobel/172aw02/notes9.pdf
Kalderemidis, I., Farao, A., Bountakas, P., Panda, S., & Xenakis, C. (2022). GTM: Game Theoretic Methodology for optimal cybersecurity defending strategies and investments. 1–9.
Khalid, M. N. A., Al-Kadhimi, A. A., & Singh, M. M. (2023). Recent developments in game-theory approaches for the de-tection and defense against advanced persistent threats (APTs): A systematic review. Mathematics, 11(6), 1353.
Knapp, E. D., & Langill, J. T. (2014). Industrial Network Security: Securing critical infrastructure networks for smart grid, SCADA, and other Industrial Control Systems. Syngress.
Krishnaiyer, K., Chen, F. F., & Bouzary, H. (2018). Cloud Kanban Framework for Service Operations Management. Proce-dia Manufacturing, 17, 531–538. https://doi.org/10.1016/j.promfg.2018.10.093
Li, X., Hu, X., & Jiang, T. (2023). Dual-Reinforcement-Learning-Based Attack Path Prediction for 5G Industrial Cyber–Physical Systems. IEEE Internet of Things Journal, 11(1), 50–58.
Liu, P., Zang, W., & Yu, M. (2005). Incentive-based modeling and inference of attacker intent, objectives, and strategies. ACM Transactions on Information and System Security (TISSEC), 8(1), 78–118.
Liu, X. F., Shahriar, M. R., Al Sunny, S. M. N., Leu, M. C., & Hu, L. (2017). Cyber-physical manufacturing cloud: Architec-ture, virtualization, communication, and testbed. Journal of Manufacturing Systems, 43, 352–364. https://doi.org/10.1016/j.jmsy.2017.04.004
Liu, Z., Ma, B., Xing, J., & Cao, W. (2023). Computer Security Active Defense Technology Based on Bayesian Model. Ap-plied Mathematics and Nonlinear Sciences.
Lye, K., & Wing, J. M. (2005). Game strategies in network security. International Journal of Information Security, 4(1–2), 71–86.
Manufacturing—Cyber Executive Briefing | Deloitte | Analysis. (2016). Deloitte Belgium. https://www2.deloitte.com/be/en/pages/risk/articles/Manufacturing.html
Miller, K. L. (2016). What We Talk About When We Talk About “Reasonable Cybersecurity”: A Proactive and Adaptive Approach. FLA. BJ, 90, 23–23.
Nash, J. (1951). Non-cooperative games. Annals of Mathematics, 286–295.
Owen, G. (1995). Game theory. Academic Press.
Pearce, H., Pinisetty, S., Roop, P. S., Kuo, M. M., & Ukil, A. (2019). Smart I/O modules for mitigating cyber-physical at-tacks on industrial control systems. IEEE Transactions on Industrial Informatics, 16(7), 4659–4669.
Peng, B., Liu, J., & Zeng, J. (2023). Dynamic analysis of multiplex networks with hybrid maintenance strategies. IEEE Transactions on Information Forensics and Security.
Peng, T., Lu, Y., Zuo, J., & Gan, J. (2021). Research on Strategy Selection of Dynamic Defense Based on Game Theory. 479–484.
Portilla, N. B., de Queiroz, M. H., & Cury, J. E. (2014). Integration of supervisory control with SCADA system for a flexi-ble manufacturing cell. Industrial Informatics (INDIN), 2014 12th IEEE International Conference On, 261–266. http://ieeexplore.ieee.org/abstract/document/6945518/
Riel, A., Kreiner, C., Macher, G., & Messnarz, R. (2017). Integrated design for tackling safety and security challenges of smart products and digital manufacturing. CIRP Annals, 66(1), 177–180. https://doi.org/10.1016/j.cirp.2017.04.037
Roy, S., Ellis, C., Shiva, S., Dasgupta, D., Shandilya, V., & Wu, Q. (2010). A survey of game theory as applied to network security. System Sciences (HICSS), 2010 43rd Hawaii International Conference On, 1–10. http://ieeexplore.ieee.org/abstract/document/5428673/
Sallhammar, K., Helvik, B. E., & Knapskog, S. J. (2006). Towards a stochastic model for integrated security and dependa-bility evaluation. Availability, Reliability and Security, 2006. ARES 2006. The First International Conference On, 8-pp. http://ieeexplore.ieee.org/abstract/document/1625306/
Shafae, M. S., Wells, L. J., & Purdy, G. T. (2019). Defending against product-oriented cyber-physical attacks on machining systems. The International Journal of Advanced Manufacturing Technology. https://doi.org/10.1007/s00170-019-03805-z
Shao, C.-W., & Li, Y.-F. (2021). Optimal defense resources allocation for power system based on bounded rationality game theory analysis. IEEE Transactions on Power Systems, 36(5), 4223–4234.
Singh, S., Karimipour, H., HaddadPajouh, H., & Dehghantanha, A. (2020). Artificial Intelligence and Security of Industrial Control Systems. In K.-K. R. Choo & A. Dehghantanha (Eds.), Handbook of Big Data Privacy (pp. 121–164). Springer International Publishing. https://doi.org/10.1007/978-3-030-38557-6_7
Sturm, L. D., Williams, C. B., Camelio, J. A., White, J., & Parker, R. (2017). Cyber-physical vulnerabilities in additive manufacturing systems: A case study attack on the. STL file with human subjects. Journal of Manufacturing Systems, 44, 154–164.
Sun, G., Alpcan, T., Rubinstein, B. I., & Camtepe, S. (2023). To Act or Not To Act: An Adversarial Game for Securing Ve-hicle Platoons. IEEE Transactions on Information Forensics and Security.
Tashakkori, A., Erfanibehrouz, N., Mirshekari, S., Sodagartojgi, A., & Gupta, V. (2024). Enhancing stock market predic-tion accuracy with recurrent deep learning models: A case study on the CAC40 index. World Journal of Advanced Re-search and Reviews, 23(1), 2309–2321.
Vincent, H., Wells, L., Tarazaga, P., & Camelio, J. (2015). Trojan detection and side-channel analyses for cyber-security in cyber-physical manufacturing systems. Procedia Manufacturing, 1, 77–85.
Von Neumann, J., & Morgenstern, O. (1947). Theory of games and economic behavior, 2nd rev.
Wan, Z., Cho, J.-H., Zhu, M., Anwar, A. H., Kamhoua, C. A., & Singh, M. P. (2023). Resisting multiple advanced persistent threats via hypergame-theoretic defensive deception. IEEE Transactions on Network and Service Management, 20(3), 3816–3830.
Wells, L. J., Camelio, J. A., Williams, C. B., & White, J. (2014). Cyber-physical security challenges in manufacturing sys-tems. Manufacturing Letters, 2(2), 74–77.
Wu, M., Song, J., Lucas Lin, L. W., Aurelle, N., Liu, Y., Ding, B., Song, Z., & Moon, Y. B. (2018). Establishment of intru-sion detection testbed for CyberManufacturing systems. Procedia Manufacturing, 26, 1053–1064. https://doi.org/10.1016/j.promfg.2018.07.142
Wu, M., Song, Z., & Moon, Y. B. (2017). Detecting cyber-physical attacks in CyberManufacturing systems with machine learning methods. Journal of Intelligent Manufacturing. https://doi.org/10.1007/s10845-017-1315-5
Xu, X., Wang, G., Hu, J., & Lu, Y. (2020). Study on stochastic differential game model in network attack and defense. Secu-rity and Communication Networks, 2020(1), 3417039.
Yan, B., Yao, P., Wang, J., Yang, T., Ruan, W., & Yang, Q. (2021). Game theoretical dynamic cybersecurity defense strategy for electrical cyber physical systems. 2392–2397.
Yang, M., & Feng, L. (2023). Optimal Defense Strategy for Data Security Based on Improving Evolutionary Game Model between Heterogeneous Groups. Journal of Computers, 34(2), 141–160.
Yang, Y. M., Guo, Y., Feng, L. C., & Di, J. Y. (2011). Solving two-person zero-sum game by Matlab. Applied Mechanics and Materials, 50, 262–265.
Yao, P., Hao, W., Yan, B., Yang, T., Wang, J., & Yang, Q. (2021). Game-Theoretic Model for Optimal Cyber-Attack Defen-sive Decision-Making in Cyber-Physical Power Systems. 2359–2364.
Zarreh, A., Saygin, C., Wan, H., Lee, Y., & Bracho, A. (2018a). A game theory based cybersecurity assessment model for advanced manufacturing systems. Procedia Manufacturing, 26, 1255–1264.
Zarreh, A., Saygin, C., Wan, H., Lee, Y., & Bracho, A. (2018b). Cybersecurity Analysis of Smart Manufacturing System Using Game Theory Approach and Quantal Response Equilibrium. Procedia Manufacturing, 17, 1001–1008.
Zarreh, A., Wan, H., Lee, Y., Saygin, C., & Al Janahi, R. (2019a). Cyber-Security Concerns for Total Productive Mainte-nance in Smart Manufacturing Systems. Procedia Manufacturing, Accepted.
Zarreh, A., Wan, H., Lee, Y., Saygin, C., & Al Janahi, R. (2019b). Risk Assessment for Cyber Security of Manufacturing Systems: A Game Theory Approach. Procedia Manufacturing, Accepted.
Zarreh, M., Khandan, M., Goli, A., Aazami, A., & Kummer, S. (2024). Integrating Perishables into Closed-Loop Supply Chains: A Comprehensive Review. Sustainability, 16(15), 6705.
Zarreh, M., Yaghoubi, S., & Bahrami, H. (2024). Pricing of drinking water under dynamic supply and demand based on government role: A game-theoretic approach. Water Resources Management, 38(6), 2101–2133.
Zeltmann, S. E., Gupta, N., Tsoutsos, N. G., Maniatakos, M., Rajendran, J., & Karri, R. (2016). Manufacturing and security challenges in 3D printing. Jom, 68(7), 1872–1881.
Zhang, H., Tan, J., Liu, X., Huang, S., Hu, H., & Zhang, Y. (2022). Cybersecurity threat assessment integrating qualitative differential and evolutionary games. IEEE Transactions on Network and Service Management, 19(3), 3425–3437.
Zhang, L., Zhu, T., Hussain, F. K., Ye, D., & Zhou, W. (2022). A game-theoretic method for defending against advanced persistent threats in cyber systems. IEEE Transactions on Information Forensics and Security, 18, 1349–1364.
Zhang, Y., Peng, Z., Wen, G., Wang, J., & Huang, T. (2023). Optimal Stealthy Linear Man-in-the-Middle Attacks With Re-source Constraints on Remote State Estimation. IEEE Transactions on Systems, Man, and Cybernetics: Systems.
Zhu, B., Joseph, A., & Sastry, S. (2011). A Taxonomy of Cyber Attacks on SCADA Systems. 2011 International Confer-ence on Internet of Things and 4th International Conference on Cyber, Physical and Social Computing, 380–388. https://doi.org/10.1109/iThings/CPSCom.2011.34
Zhu, T., Ye, D., Cheng, Z., Zhou, W., & Philip, S. Y. (2022). Learning games for defending advanced persistent threats in cyber systems. IEEE Transactions on Systems, Man, and Cybernetics: Systems, 53(4), 2410–2422.
Aghakhani, S., Pourmand, P., & Zarreh, M. (2023). A Mathematical Optimization Model for the Pharmaceutical Waste Lo-cation‐Routing Problem Using Genetic Algorithm and Particle Swarm Optimization. Mathematical Problems in Engineer-ing, 2023(1), 6165495.
Ait Temghart, A., Marwan, M., & Baslam, M. (2023). Stackelberg Security Game for Optimizing Cybersecurity Decisions in Cloud Computing. Security and Communication Networks, 2023(1), 2811038.
Ali, S., Balushi, T. A., Nadir, Z., & Hussain, O. K. (2018). ICS/SCADA System Security for CPS. In Cyber Security for Cyber Physical Systems (pp. 89–113). Springer, Cham. https://doi.org/10.1007/978-3-319-75880-0_5
Ani, U. P. D., He, H., & Tiwari, A. (2017). Review of cybersecurity issues in industrial critical infrastructure: Manufacturing in perspective. Journal of Cyber Security Technology, 1(1), 32–74.
Bagheri, B., Yang, S., Kao, H.-A., & Lee, J. (2015). Cyber-physical Systems Architecture for Self-Aware Machines in Indus-try 4.0 Environment. IFAC-PapersOnLine, 48(3), 1622–1627. https://doi.org/10.1016/j.ifacol.2015.06.318
Banik, S., Ramachandran, T., Bhattacharya, A., & Bopardikar, S. D. (2023). Automated Adversary-in-the-Loop Cyber-Physical Defense Planning. ACM Transactions on Cyber-Physical Systems, 7(3), 1–25.
Banitaba, F. S., Aygun, S., & Najafi, M. H. (2024). Late Breaking Results: Fortifying Neural Networks: Safeguarding Against Adversarial Attacks with Stochastic Computing. arXiv Preprint arXiv:2407.04861.
Bouzary, H., & Chen, F. F. (2018). Service optimal selection and composition in cloud manufacturing: A comprehensive survey. The International Journal of Advanced Manufacturing Technology, 1–14.
Bouzary, H., & Chen, F. F. (2019). A hybrid grey wolf optimizer algorithm with evolutionary operators for optimal QoS-aware service composition and optimal selection in cloud manufacturing. The International Journal of Advanced Manu-facturing Technology, 101(9–12), 2771–2784.
Cardenas, A., Amin, S., Sinopoli, B., Giani, A., Perrig, A., & Sastry, S. (2009). Challenges for securing cyber physical sys-tems. Workshop on Future Directions in Cyber-Physical Systems Security, 5. https://pdfs.semanticscholar.org/d514/97e5827cc00d9d00c26e27a769d42284cfba.pdf
Coffey, K., Maglaras, L. A., Smith, R., Janicke, H., Ferrag, M. A., Derhab, A., Mukherjee, M., Rallis, S., & Yousaf, A. (2018). Vulnerability Assessment of Cyber Security for SCADA Systems. In S. Parkinson, A. Crampton, & R. Hill (Eds.), Guide to Vulnerability Analysis for Computer Networks and Systems: An Artificial Intelligence Approach (pp. 59–80). Springer International Publishing. https://doi.org/10.1007/978-3-319-92624-7_3
Cook, A., Smith, R., Maglaras, L., & Janicke, H. (2016). Measuring the risk of cyber attack in industrial control systems.
Cyber risk in advanced manufacturing | Deloitte US. (2017). Deloitte United States. https://www2.deloitte.com/us/en/pages/manufacturing/articles/cyber-risk-in-advanced-manufacturing.html
DBIR: Understand Your Cybersecurity Threats. (2017). Verizon Enterprise Solutions. http://www.verizonenterprise.com/verizon-insights-lab/dbir/2017/
DeSmit, Z., Kulkarni, A. U., & Wernz, C. (2018). Enhancing cyber-physical security in manufacturing through game-theoretic analysis. Cyber-Physical Systems, 4(4), 232–259.
Dutta, P. K. (1999). Strategies and games: Theory and practice. MIT press.
Fadavi, N. (2024). Dynamic Price Dispersion of Seasonal Goods in Bertrand–Edgeworth Competition. Applied Economics and Finance, 11(2), 14–33.
Ferrari, P., Sisinni, E., Bellagente, P., Rinaldi, S., Pasetti, M., de Sá, A. O., Machado, R. C., Carmo, L. F. da C., & Casimiro, A. (2020). Model-based stealth attack to networked control system based on real-time Ethernet. IEEE Transactions on Industrial Electronics, 68(8), 7672–7683.
Gao, S., Zhang, H., Wang, Z., Huang, C., & Yan, H. (2022). Optimal injection attack strategy for cyber-physical systems under resource constraint: A game approach. IEEE Transactions on Control of Network Systems, 10(2), 636–646.
Ge, Y., & Zhu, Q. (2023). Gazeta: Game-theoretic zero-trust authentication for defense against lateral movement in 5g iot networks. IEEE Transactions on Information Forensics and Security.
Goeree, J. K., Holt, C. A., & Palfrey, T. R. (2016). Quantal Response Equilibrium: A Stochastic Theory of Games. Princeton University Press.
Henze, M., Hiller, J., Hummen, R., Matzutt, R., Wehrle, K., & Ziegeldorf, J. H. (2017). Network Security and Privacy for Cyber-Physical Systems. Security and Privacy in Cyber-Physical Systems: Foundations, Principles and Applications, H. Song, GA Fink, and S. Jeschke (Eds.).
Hu, H., Liu, Y., Chen, C., Zhang, H., & Liu, Y. (2020). Optimal decision making approach for cyber security defense using evolutionary game. IEEE Transactions on Network and Service Management, 17(3), 1683–1700.
Hu, Y., Zhang, H., Guo, Y., Li, T., & Ma, J. (2020). A Novel Attack‐and‐Defense Signaling Game for Optimal Deceptive Defense Strategy Choice. Wireless Communications and Mobile Computing, 2020(1), 8850356.
J Bayuk, D Cavit, E Guerrino, J Mahony, B McDowell, & P. Staarfanger. (2011). Malware risks and mitigation report (BITS Financial Services Roundtable).
Jakovljevic, Z., Majstorovic, V., Stojadinovic, S., Zivkovic, S., Gligorijevic, N., & Pajic, M. (2017). Cyber-Physical Manu-facturing Systems (CPMS). In V. Majstorovic & Z. Jakovljevic (Eds.), Proceedings of 5th International Conference on Advanced Manufacturing Engineering and Technologies (pp. 199–214). Springer International Publishing.
Joel Sobel. (n.d.). Linear Programming Notes IX: Two-Person Zero-Sum Game Theory. https://econweb.ucsd.edu/~jsobel/172aw02/notes9.pdf
Kalderemidis, I., Farao, A., Bountakas, P., Panda, S., & Xenakis, C. (2022). GTM: Game Theoretic Methodology for optimal cybersecurity defending strategies and investments. 1–9.
Khalid, M. N. A., Al-Kadhimi, A. A., & Singh, M. M. (2023). Recent developments in game-theory approaches for the de-tection and defense against advanced persistent threats (APTs): A systematic review. Mathematics, 11(6), 1353.
Knapp, E. D., & Langill, J. T. (2014). Industrial Network Security: Securing critical infrastructure networks for smart grid, SCADA, and other Industrial Control Systems. Syngress.
Krishnaiyer, K., Chen, F. F., & Bouzary, H. (2018). Cloud Kanban Framework for Service Operations Management. Proce-dia Manufacturing, 17, 531–538. https://doi.org/10.1016/j.promfg.2018.10.093
Li, X., Hu, X., & Jiang, T. (2023). Dual-Reinforcement-Learning-Based Attack Path Prediction for 5G Industrial Cyber–Physical Systems. IEEE Internet of Things Journal, 11(1), 50–58.
Liu, P., Zang, W., & Yu, M. (2005). Incentive-based modeling and inference of attacker intent, objectives, and strategies. ACM Transactions on Information and System Security (TISSEC), 8(1), 78–118.
Liu, X. F., Shahriar, M. R., Al Sunny, S. M. N., Leu, M. C., & Hu, L. (2017). Cyber-physical manufacturing cloud: Architec-ture, virtualization, communication, and testbed. Journal of Manufacturing Systems, 43, 352–364. https://doi.org/10.1016/j.jmsy.2017.04.004
Liu, Z., Ma, B., Xing, J., & Cao, W. (2023). Computer Security Active Defense Technology Based on Bayesian Model. Ap-plied Mathematics and Nonlinear Sciences.
Lye, K., & Wing, J. M. (2005). Game strategies in network security. International Journal of Information Security, 4(1–2), 71–86.
Manufacturing—Cyber Executive Briefing | Deloitte | Analysis. (2016). Deloitte Belgium. https://www2.deloitte.com/be/en/pages/risk/articles/Manufacturing.html
Miller, K. L. (2016). What We Talk About When We Talk About “Reasonable Cybersecurity”: A Proactive and Adaptive Approach. FLA. BJ, 90, 23–23.
Nash, J. (1951). Non-cooperative games. Annals of Mathematics, 286–295.
Owen, G. (1995). Game theory. Academic Press.
Pearce, H., Pinisetty, S., Roop, P. S., Kuo, M. M., & Ukil, A. (2019). Smart I/O modules for mitigating cyber-physical at-tacks on industrial control systems. IEEE Transactions on Industrial Informatics, 16(7), 4659–4669.
Peng, B., Liu, J., & Zeng, J. (2023). Dynamic analysis of multiplex networks with hybrid maintenance strategies. IEEE Transactions on Information Forensics and Security.
Peng, T., Lu, Y., Zuo, J., & Gan, J. (2021). Research on Strategy Selection of Dynamic Defense Based on Game Theory. 479–484.
Portilla, N. B., de Queiroz, M. H., & Cury, J. E. (2014). Integration of supervisory control with SCADA system for a flexi-ble manufacturing cell. Industrial Informatics (INDIN), 2014 12th IEEE International Conference On, 261–266. http://ieeexplore.ieee.org/abstract/document/6945518/
Riel, A., Kreiner, C., Macher, G., & Messnarz, R. (2017). Integrated design for tackling safety and security challenges of smart products and digital manufacturing. CIRP Annals, 66(1), 177–180. https://doi.org/10.1016/j.cirp.2017.04.037
Roy, S., Ellis, C., Shiva, S., Dasgupta, D., Shandilya, V., & Wu, Q. (2010). A survey of game theory as applied to network security. System Sciences (HICSS), 2010 43rd Hawaii International Conference On, 1–10. http://ieeexplore.ieee.org/abstract/document/5428673/
Sallhammar, K., Helvik, B. E., & Knapskog, S. J. (2006). Towards a stochastic model for integrated security and dependa-bility evaluation. Availability, Reliability and Security, 2006. ARES 2006. The First International Conference On, 8-pp. http://ieeexplore.ieee.org/abstract/document/1625306/
Shafae, M. S., Wells, L. J., & Purdy, G. T. (2019). Defending against product-oriented cyber-physical attacks on machining systems. The International Journal of Advanced Manufacturing Technology. https://doi.org/10.1007/s00170-019-03805-z
Shao, C.-W., & Li, Y.-F. (2021). Optimal defense resources allocation for power system based on bounded rationality game theory analysis. IEEE Transactions on Power Systems, 36(5), 4223–4234.
Singh, S., Karimipour, H., HaddadPajouh, H., & Dehghantanha, A. (2020). Artificial Intelligence and Security of Industrial Control Systems. In K.-K. R. Choo & A. Dehghantanha (Eds.), Handbook of Big Data Privacy (pp. 121–164). Springer International Publishing. https://doi.org/10.1007/978-3-030-38557-6_7
Sturm, L. D., Williams, C. B., Camelio, J. A., White, J., & Parker, R. (2017). Cyber-physical vulnerabilities in additive manufacturing systems: A case study attack on the. STL file with human subjects. Journal of Manufacturing Systems, 44, 154–164.
Sun, G., Alpcan, T., Rubinstein, B. I., & Camtepe, S. (2023). To Act or Not To Act: An Adversarial Game for Securing Ve-hicle Platoons. IEEE Transactions on Information Forensics and Security.
Tashakkori, A., Erfanibehrouz, N., Mirshekari, S., Sodagartojgi, A., & Gupta, V. (2024). Enhancing stock market predic-tion accuracy with recurrent deep learning models: A case study on the CAC40 index. World Journal of Advanced Re-search and Reviews, 23(1), 2309–2321.
Vincent, H., Wells, L., Tarazaga, P., & Camelio, J. (2015). Trojan detection and side-channel analyses for cyber-security in cyber-physical manufacturing systems. Procedia Manufacturing, 1, 77–85.
Von Neumann, J., & Morgenstern, O. (1947). Theory of games and economic behavior, 2nd rev.
Wan, Z., Cho, J.-H., Zhu, M., Anwar, A. H., Kamhoua, C. A., & Singh, M. P. (2023). Resisting multiple advanced persistent threats via hypergame-theoretic defensive deception. IEEE Transactions on Network and Service Management, 20(3), 3816–3830.
Wells, L. J., Camelio, J. A., Williams, C. B., & White, J. (2014). Cyber-physical security challenges in manufacturing sys-tems. Manufacturing Letters, 2(2), 74–77.
Wu, M., Song, J., Lucas Lin, L. W., Aurelle, N., Liu, Y., Ding, B., Song, Z., & Moon, Y. B. (2018). Establishment of intru-sion detection testbed for CyberManufacturing systems. Procedia Manufacturing, 26, 1053–1064. https://doi.org/10.1016/j.promfg.2018.07.142
Wu, M., Song, Z., & Moon, Y. B. (2017). Detecting cyber-physical attacks in CyberManufacturing systems with machine learning methods. Journal of Intelligent Manufacturing. https://doi.org/10.1007/s10845-017-1315-5
Xu, X., Wang, G., Hu, J., & Lu, Y. (2020). Study on stochastic differential game model in network attack and defense. Secu-rity and Communication Networks, 2020(1), 3417039.
Yan, B., Yao, P., Wang, J., Yang, T., Ruan, W., & Yang, Q. (2021). Game theoretical dynamic cybersecurity defense strategy for electrical cyber physical systems. 2392–2397.
Yang, M., & Feng, L. (2023). Optimal Defense Strategy for Data Security Based on Improving Evolutionary Game Model between Heterogeneous Groups. Journal of Computers, 34(2), 141–160.
Yang, Y. M., Guo, Y., Feng, L. C., & Di, J. Y. (2011). Solving two-person zero-sum game by Matlab. Applied Mechanics and Materials, 50, 262–265.
Yao, P., Hao, W., Yan, B., Yang, T., Wang, J., & Yang, Q. (2021). Game-Theoretic Model for Optimal Cyber-Attack Defen-sive Decision-Making in Cyber-Physical Power Systems. 2359–2364.
Zarreh, A., Saygin, C., Wan, H., Lee, Y., & Bracho, A. (2018a). A game theory based cybersecurity assessment model for advanced manufacturing systems. Procedia Manufacturing, 26, 1255–1264.
Zarreh, A., Saygin, C., Wan, H., Lee, Y., & Bracho, A. (2018b). Cybersecurity Analysis of Smart Manufacturing System Using Game Theory Approach and Quantal Response Equilibrium. Procedia Manufacturing, 17, 1001–1008.
Zarreh, A., Wan, H., Lee, Y., Saygin, C., & Al Janahi, R. (2019a). Cyber-Security Concerns for Total Productive Mainte-nance in Smart Manufacturing Systems. Procedia Manufacturing, Accepted.
Zarreh, A., Wan, H., Lee, Y., Saygin, C., & Al Janahi, R. (2019b). Risk Assessment for Cyber Security of Manufacturing Systems: A Game Theory Approach. Procedia Manufacturing, Accepted.
Zarreh, M., Khandan, M., Goli, A., Aazami, A., & Kummer, S. (2024). Integrating Perishables into Closed-Loop Supply Chains: A Comprehensive Review. Sustainability, 16(15), 6705.
Zarreh, M., Yaghoubi, S., & Bahrami, H. (2024). Pricing of drinking water under dynamic supply and demand based on government role: A game-theoretic approach. Water Resources Management, 38(6), 2101–2133.
Zeltmann, S. E., Gupta, N., Tsoutsos, N. G., Maniatakos, M., Rajendran, J., & Karri, R. (2016). Manufacturing and security challenges in 3D printing. Jom, 68(7), 1872–1881.
Zhang, H., Tan, J., Liu, X., Huang, S., Hu, H., & Zhang, Y. (2022). Cybersecurity threat assessment integrating qualitative differential and evolutionary games. IEEE Transactions on Network and Service Management, 19(3), 3425–3437.
Zhang, L., Zhu, T., Hussain, F. K., Ye, D., & Zhou, W. (2022). A game-theoretic method for defending against advanced persistent threats in cyber systems. IEEE Transactions on Information Forensics and Security, 18, 1349–1364.
Zhang, Y., Peng, Z., Wen, G., Wang, J., & Huang, T. (2023). Optimal Stealthy Linear Man-in-the-Middle Attacks With Re-source Constraints on Remote State Estimation. IEEE Transactions on Systems, Man, and Cybernetics: Systems.
Zhu, B., Joseph, A., & Sastry, S. (2011). A Taxonomy of Cyber Attacks on SCADA Systems. 2011 International Confer-ence on Internet of Things and 4th International Conference on Cyber, Physical and Social Computing, 380–388. https://doi.org/10.1109/iThings/CPSCom.2011.34
Zhu, T., Ye, D., Cheng, Z., Zhou, W., & Philip, S. Y. (2022). Learning games for defending advanced persistent threats in cyber systems. IEEE Transactions on Systems, Man, and Cybernetics: Systems, 53(4), 2410–2422.