2023
DOI: 10.1016/j.trc.2023.104124
|View full text |Cite
|
Sign up to set email alerts
|

Biobjective robust Network-wide traffic signal optimization against Cyber-attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(1 citation statement)
references
References 46 publications
0
1
0
Order By: Relevance
“…Finding the conditions for UC and TSM to give up defense will help security officers avoid such a situation. Finding out the condition of the attacker to abandon the attack can also effectively reduce the occurrence of UTC system security accidents [21]. Therefore, EGT is used to analyze and study the offensive and defensive game process of UTC system security.…”
Section: Problem Formulationmentioning
confidence: 99%
“…Finding the conditions for UC and TSM to give up defense will help security officers avoid such a situation. Finding out the condition of the attacker to abandon the attack can also effectively reduce the occurrence of UTC system security accidents [21]. Therefore, EGT is used to analyze and study the offensive and defensive game process of UTC system security.…”
Section: Problem Formulationmentioning
confidence: 99%