Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

A Game-Theoretical Self-Adaptation Framework for Securing Software-Intensive Systems

Published: 20 April 2024 Publication History

Abstract

Security attacks present unique challenges to the design of self-adaptation mechanism for software-intensive systems due to the adversarial nature of the environment. Game-theoretical approaches have been explored in security to model malicious behaviors and design reliable defense for the system in a mathematically grounded manner. However, modeling the system as a single player, as done in prior works, is insufficient for the system under partial compromise and for the design of fine-grained defensive policies where the rest of the system with autonomy can cooperate to mitigate the impact of attacks. To address such issues, we propose a new self-adaptation framework incorporating Bayesian game theory and model the defender (i.e., the system) at the granularity of components. Under security attacks, the architecture model of the system is automatically translated, by the proposed translation process with designed algorithms, into a multi-player Bayesian game. This representation allows each component to be modeled as an independent player, while security attacks are encoded as variant types for the components. By solving for pure equilibrium (i.e., adaptation response), the system’s optimal defensive strategy is dynamically computed, enhancing system resilience against security attacks by maximizing system utility. We validate the effectiveness of our framework through two sets of experiments using generic benchmark tasks tailored for the security domain. Additionally, we exemplify the practical application of our approach through a real-world implementation in the Secure Water Treatment System to demonstrate the applicability and potency in mitigating security risks.

References

[1]
Agnar Aamodt and Enric Plaza. 1994. Case-based reasoning: Foundational issues, methodological variations, and system approaches. AI Commun. 7, 1 (1994), 39–59.
[2]
Sridhar Adepu and Aditya Mathur. 2021. Distributed attack detection in a water treatment plant: Method and case study. IEEE Trans. Dependable Secur. Comput. 18, 1 (2021), 86–99. DOI:
[3]
Sridhar Adepu, Jay Prakash, and Aditya Mathur. 2017. WaterJam: An experimental case study of jamming attacks on a water treatment system. In Proceedings of the 2017 IEEE International Conference on Software Quality, Reliability and Security Companion, QRS-C 2017, Prague, Czech Republic, July 25–29, 2017. IEEE, 341–347.
[4]
Basem Al-Madani, Ahmad Shawahna, and Mohammad Qureshi. 2019. Anomaly detection for industrial control networks using machine learning with the help from the inter-arrival curves. arXiv:1911.05692. Retrieved from https://arxiv.org/abs/1911.05692
[5]
Y. Al-Nashif, A. A. Kumar, S. Hariri, Y. Luo, F. Szidarovsky, and G. Qu. 2008. Multi-level intrusion detection system (ML-IDS). In Proceedings of the 2008 International Conference on Autonomic Computing. 131–140.
[6]
Christopher Bailey, Lionel Montrieux, Rogério de Lemos, Yijun Yu, and Michel Wermelinger. 2014. Run-time generation, transformation, and verification of access control models for self-protection. In Proceedings of the 9th International Symposium on Software Engineering for Adaptive and Self-Managing Systems, SEAMS 2014, Hyderabad, India, June 2–3, 2014. 135–144.
[7]
Jonathan J. Blount, Daniel R. Tauritz, and Samuel A. Mulder. 2011. Adaptive rule-based malware detection employing learning classifier systems: A proof of concept. In Workshop Proceedings of the 35th Annual IEEE International Computer Software and Applications Conference, COMPSAC Workshops, Munich, Germany, 18–22 July. 110–115.
[8]
Romain Brenguier. 2013. PRALINE: A tool for computing nash equilibria in concurrent games. In Proceedings of the 25th International Conference on Computer Aided Verification - CAV 2013, Saint Petersburg, Russia, July 13–19, 2013.Natasha Sharygina and Helmut Veith (Eds.), Lecture Notes in Computer Science, Vol. 8044,Springer, 890–895.
[9]
Mike Burmester, Emmanouil Magkos, and Vassilios Chrissikopoulos. 2012. Modeling security in cyber-physical systems. Int. J. Crit. Infrastructure Prot. 5, 3-4 (2012), 118–126.
[10]
Radu Calinescu, Carlo Ghezzi, Marta Z. Kwiatkowska, and Raffaela Mirandola. 2012. Self-adaptive software needs quantitative verification at runtime. Commun. ACM 55, 9 (2012), 69–77.
[11]
Javier Cámara, David Garlan, Gabriel A. Moreno, and Bradley R. Schmerl. 2013. Analyzing self-adaptation via model checking of stochastic games. In Proceedings of the Software Engineering for Self-Adaptive Systems III. Assurances - International Seminar, Dagstuhl Castle, Germany, December 15–19, 2013, Revised Selected and Invited Papers(Lecture Notes in Computer Science, Vol. 9640). Springer, 154–187.
[12]
Javier Cámara, Gabriel A. Moreno, and David Garlan. 2014. Stochastic game analysis and latency awareness for proactive self-adaptation. In Proceedings of the 9th International Symposium on Software Engineering for Adaptive and Self-Managing Systems, SEAMS 2014, Proceedings, Hyderabad, India, June 2–3, 2014. 155–164. DOI:
[13]
Javier Cámara, Gabriel A. Moreno, and David Garlan. 2015. Reasoning about human participation in self-adaptive systems. In Proceedings of the10th IEEE/ACM International Symposium on Software Engineering for Adaptive and Self-Managing Systems, SEAMS, Florence, Italy, May 18–19, 2015. 146–156.
[14]
Javier Cámara, Gabriel A. Moreno, David Garlan, and Bradley R. Schmerl. 2016. Analyzing latency-aware self-adaptation using stochastic games and simulations. ACM Trans. Auton. Adapt. Syst. 10, 4 (2016), 23:1–23:28.
[15]
Shang-Wen Cheng, David Garlan, and Bradley R. Schmerl. 2009. Evaluating the effectiveness of the Rainbow self-adaptive system. In Proceedings of the 2009 ICSE Workshop on Software Engineering for Adaptive and Self-Managing Systems, SEAMS 2009, Vancouver, BC, Canada, May 18–19, 2009. 132–141.
[16]
Yulia Cherdantseva, Pete Burnap, Andrew Blyth, Peter Eden, Kevin Jones, Hugh Soulsby, and Kristan Stoddart. 2016. A review of cyber security risk assessment methods for SCADA systems. Comput. Secur. 56 (2016), 1–27.
[17]
Thomas H. Cormen, Charles E. Leiserson, Ronald L. Rivest, and Clifford Stein. 2009. Introduction to Algorithms. MIT Press.
[18]
J. Cámara, D. Garlan, G. A. Moreno, and B. Schmerl. 2017. Chapter 7 - evaluating tradeoffs of human involvement in self-adaptive systems. In Proceedings of the Managing TradeOffs in Adaptable Software Architectures. Ivan Mistrik, Nour Ali, Rick Kazman, John Grundy, and Bradley Schmerl (Eds.). Morgan Kaufmann, Boston, 155–180. DOI:
[19]
Tanmoy Kanti Das, Sridhar Adepu, and Jianying Zhou. 2020. Anomaly detection in industrial control systems using logical analysis of data. Computers and Security 96 (2020), 101935.
[20]
Alexandre David, Peter Gjøl Jensen, Kim Guldstrand Larsen, Marius Mikucionis, and Jakob Haahr Taankvist. 2015. Uppaal stratego. In Proceedings of the 21st International Conference on Tools and Algorithms for the Construction and Analysis of Systems - TACAS 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2015, London, UK, April 11–18, 2015(Lecture Notes in Computer Science, Vol. 9035). Springer, 206–211.
[21]
Rogério de Lemos, Holger Giese, Hausi A. Mü ller, Mary Shaw, Jesper Andersson. 2010. Software engineering for self-adaptive systems: A second research roadmap. In Proceedings of the Software Engineering for Self-Adaptive Systems II - International Seminar, Germany, October 24-29.
[22]
Premkumar T. Devanbu and Stuart G. Stubblebine. 2000. Software engineering for security: A roadmap. In Proceedings of the 22nd International Conference on Software Engineering, Future of Software Engineering Track, ICSE 2000, Limerick Ireland, June 4–11, 2000. 227–239.
[23]
Trajce Dimkov, Wolter Pieters, and Pieter H. Hartel. 2010. Portunes: Representing attack scenarios spanning through the physical, digital and social domain. In Proceedings of the Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security - Joint Workshop, ARSPA-WITS 2010, Paphos, Cyprus. 112–129.
[24]
Cuong T. Do, Nguyen H. Tran, Choong Seon Hong, Charles A. Kamhoua, Kevin A. Kwiat, Erik Blasch, Shaolei Ren, Niki Pissinou, and Sundaraja Sitharama Iyengar. 2017. Game theory for cyber security and privacy. ACM Comput. Surv. 50, 2 (2017), 30:1–30:37. DOI:
[25]
Dmitry Dudorov, David Stupples, and Martin Newby. 2013. Probability analysis of cyber attack paths against business and commercial enterprise systems. In Proceedings of the 2013 European Intelligence and Security Informatics Conference, Uppsala, Sweden, August 12-14, 2013. 38–44.
[26]
Ahmed M. Elkhodary, Naeem Esfahani, and Sam Malek. 2010. FUSION: A framework for engineering self-tuning self-adaptive software systems. In Proceedings of the 18th ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2010, Santa Fe, NM, USA, November 7–11, 2010. ACM, 7–16.
[27]
Ahmed M. Elkhodary and Jon Whittle. 2007. A survey of approaches to adaptive application security. In Proceedings of the 2007 ICSE Workshop on Software Engineering for Adaptive and Self-Managing Systems, SEAMS 2007, Minneapolis Minnesota, USA, May 20–26, 2007. 16.
[28]
Mahsa Emami-Taba. 2017. A game-theoretic decision-making framework for engineering self-protecting software systems. In Proceedings of the 39th International Conference on Software Engineering, ICSE 2017, Buenos Aires, Argentina, May 20–28, 2017 - Companion Volume. 449–452.
[29]
Mahsa Emami-Taba and Ladan Tahvildari. 2016. A bayesian game decision-making model for uncertain adversary types. In Proceedings of the 26th Annual International Conference on Computer Science and Software Engineering, CASCON 2016, Toronto, Ontario, Canada, October 31 – November 2, 2016. Marcellus Mindel, Blake Jones, Hausi A. Müller, and Vio Onut (Eds.), IBM/ACM, 39–49.
[30]
Sadegh Farhang and Jens Grossklags. 2016. FlipLeakage: A game-theoretic approach to protect against stealthy attackers in the presence of information leakage. In Proceedings of the 7th International Conference on Decision and Game Theory for Security - GameSec 2016, New York, NY, USA, November 2–4, 2016. 195–214. DOI:
[31]
Drew Fudenberg and Jean Tirole. 1991. Game Theory. MIT Press.
[32]
David Garlan, Robert T. Monroe, and David Wile. 1997. Acme: An architecture description interchange language. In Proceedings of the 1997 Conference of the Centre for Advanced Studies on Collaborative Research, November 10–13, 1997, Toronto, Ontario, Canada. IBM, 7.
[33]
Thomas J. Glazier and David Garlan. 2019. An automated approach to management of a collection of autonomic systems. In Proceedings of the IEEE 4th International Workshops on Foundations and Applications of Self* Systems, FAS*W@SASO/ICCAC 2019, Umea, Sweden, June 16–20, 2019. 110–115.
[34]
Jonathan Goh, Sridhar Adepu, Marcus Tan, and Zi Shan Lee. 2017. Anomaly detection in cyber physical systems using recurrent neural networks. In Proceedings of the 2017 IEEE 18th International Symposium on High Assurance Systems Engineering (HASE). IEEE, 140–145.
[35]
M. Hajizadeh, T. V. Phan, and T. Bauschert. 2018. Probability analysis of successful cyber attacks in SDN-based networks. In Proceedings of the 2018 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN). 1–6.
[36]
René Rydhof Hansen, Kim Guldstrand Larsen, Axel Legay, Peter Gjøl Jensen, and Danny Bøgsted Poulsen. 2021. ADTLang: A programming language approach to attack defense trees. Int. J. Softw. Tools Technol. Transf. 23, 1 (2021), 89–104.
[37]
John C. Harsanyi. 2004. Games with incomplete information played by Bayesian players, I-III. Management Science 50, 12 (2004), 1804–1817.
[38]
Zhongyuan Hau, John Henry Castellanos, and Jianying Zhou. 2020. Evaluating cascading impact of attacks on resilience of industrial control systems: A design-centric modeling approach. In Proceedings of the 6th ACM Workshop on Cyber-Physical System Security, CPSS@AsiaCCS 2020, Taipei, Taiwan, October 6, 2020. ACM, 42–53.
[39]
George T. Heineman and William T. Councill (Eds.). 2001. Component-Based Software Engineering: Putting the Pieces Together. Addison-Wesley Longman Publishing Co., Inc., USA.
[40]
Morgan Henrie. 2013. Cyber security risk management in the SCADA critical infrastructure environment. Engineering Management Journal 25, 2 (2013), 38–45.
[41]
Pooyan Jamshidi, Norbert Siegmund, Miguel Velez, Christian Kästner, Akshay Patel, and Yuvraj Agarwal. 2017. Transfer learning for performance modeling of configurable systems: An exploratory analysis. In Proceedings of the 32nd IEEE/ACM International Conference on Automated Software Engineering, ASE 2017, Urbana, IL, USA, October 30 – November 03, 2017. IEEE Computer Society, 497–508.
[42]
Donald B. Johnson. 1977. Efficient algorithms for shortest paths in sparse networks. J. ACM 24, 1 (1977), 1–13.
[43]
Arthur B. Kahn. 1962. Topological sorting of large networks. Commun. ACM 5, 11 (1962), 558–562.
[44]
Eunsuk Kang, Sridhar Adepu, Daniel Jackson, and Aditya P. Mathur. 2016. Model-based security analysis of a water treatment system. In Proceedings of the 2nd International Workshop on Software Engineering for Smart Cyber-Physical Systems, SEsCPS@ICSE, Austin, Texas, USA, May 14–22, 2016. ACM, 22–28.
[45]
Jeffrey O. Kephart and David M. Chess. 2003. The vision of autonomic computing. IEEE Computer 36, 1 (2003), 41–50. DOI:
[46]
Narges Khakpour, Charilaos Skandylas, Goran Saman Nariman, and Danny Weyns. 2019. Towards secure architecture-based adaptations. In Proceedings of the 14th International Symposium on Software Engineering for Adaptive and Self-Managing Systems, SEAMS@ICSE 2019, Montreal, QC, Canada, May 25–31, 2019. ACM, 114–125.
[47]
Cody Kinneer, Ryan Wagner, Fei Fang, Claire Le Goues, and David Garlan. 2019. Modeling observability in adaptive systems to defend against advanced persistent threats. In Proceedings of the 17th ACM-IEEE International Conference on Formal Methods and Models for System Design, MEMOCODE 2019, La Jolla, CA, USA, October 9–11, 2019. 10:1–10:11.
[48]
Moshe Kravchik and Asaf Shabtai. 2018. Detecting cyber attacks in industrial control systems using convolutional neural networks. In Proceedings of the 2018 Workshop on Cyber-Physical Systems Security and PrivaCy. 72–83.
[49]
Marta Kwiatkowska, Gethin Norman, and David Parker. 2018. Probabilistic Model Checking: Advances and Applications. Springer International Publishing.
[50]
Marta Kwiatkowska, Gethin Norman, David Parker, and Gabriel Santos. 2018. Automated verification of concurrent stochastic games. In Proceedings of the 15th International Conference on Quantitative Evaluation of Systems - QEST 2018, Beijing, China, September 4–7, 2018, (Lecture Notes in Computer Science, Vol. 11024). Springer, 223–239.
[51]
Marta Kwiatkowska, Gethin Norman, David Parker, and Gabriel Santos. 2019. Equilibria-based probabilistic model checking for concurrent stochastic games. In Proceedings of the 3rd World Congress on Formal Methods - The Next 30 Years - FM 2019, Porto, Portugal, October 7–11, 2019,(Lecture Notes in Computer Science, Vol. 11800). Springer, 298–315.
[52]
Marta Kwiatkowska, David Parker, and Clemens Wiltsche. 2018. PRISM-games: Verification and strategy synthesis for stochastic multi-player games with multiple objectives. Int. J. Softw. Tools Technol. Transf. 20, 2 (2018), 195–210.
[53]
Carlton E. Lemke and Joseph T. Howson, Jr. 1964. Equilibrium points of bimatrix games. Journal of the Society for industrial and Applied Mathematics 12, 2 (1964), 413–423.
[54]
Hagay Levin, Michael Schapira, and Aviv Zohar. 2008. Interdomain routing and games. In Proceedings of the 40th Annual ACM Symposium on Theory of Computing, Victoria, British Columbia, Canada, May 17–20, 2008. 57–66.
[55]
Dan Li, Dacheng Chen, Baihong Jin, Lei Shi, Jonathan Goh, and See-Kiong Ng. 2019. MAD-GAN: Multivariate anomaly detection for time series data with generative adversarial networks. In Proceedings of the International Conference on Artificial Neural Networks. Springer, 703–716.
[56]
Nianyu Li, Sridhar Adepu, Eunsuk Kang, and David Garlan. 2020. Explanations for human-on-the-loop: A probabilistic model checking approach. In Proceedings of the 15th International Symposium on Software Engineering for Adaptive and Self-managing Systems (SEAMS). To appear.
[57]
Nianyu Li, Mingyue Zhang, Eunsuk Kang, and David Garlan. 2021. Engineering secure self-adaptive systems with bayesian games. In Proceedings of the 24th International Conference on Fundamental Approaches to Software Engineering - FASE 2021, Luxembourg City, Luxembourg, March 27 – April 1, 2021.Esther Guerra and Mariëlle Stoelinga (Eds.), Vol. 12649. Springer, 130–151.
[58]
Wyatt Lloyd, Michael J. Freedman, Michael Kaminsky, and David G. Andersen. 2013. Stronger semantics for low-latency geo-replicated storage. In Proceedings of the 10th USENIX Symposium on Networked Systems Design and Implementation, NSDI 2013, Lombard, IL, USA, April 2–5, 2013. 313–328.
[59]
Songbai Lu, Longxuan Li, Kwok-Yan Lam, and Lingyan Jia. 2009. SAODV: A MANET routing protocol that can withstand black hole attack. In Proceedings of the 2009 International Conference on Computational Intelligence and Security, CIS 2009, Beijing, China, 11–14 December 2009, Volume 2 - Workshop Papers. IEEE Computer Society, 421–425.
[60]
Leandros Maglaras, Helge Janicke, Jianmin Jiang, and Andrew Crampton. 2017. Novel intrusion detection mechanism with low overhead for SCADA systems. In Proceedings of the Security Solutions and Applied Cryptography in Smart Grid Communications. IGI Global, 160–178.
[61]
Richard D. McKelvey and Andrew McLennan. 1996. Computation of equilibria in finite games. Handbook of Computational Economics 1 (1996), 87–142.
[62]
Richard D. McKelvey, Andrew M. McLennan, and Theodore L. Turocy. 2018-02. Gambit: Software Tools for Game Theory. Retrieved from http://www.gambit-project.org
[63]
Stephanie Milani, Weiran Shen, Kevin S. Chan, Sridhar Venkatesan, Nandi O. Leslie, Charles A. Kamhoua, and Fei Fang. 2020. Harnessing the power of deception in attack graph-based security games. In Proceedings of the 11th International Conference on Decision and Game Theory for Security - GameSec 2020, College Park, MD, USA, October 28–30, 2020,(Lecture Notes in Computer Science, Vol. 12513). Springer, 147–167.
[64]
Martin J. Osborne and Ariel Rubinstein. 1994. A course in game theory. MIT Press Books (1994).
[65]
Ángel Luis Perales Gómez, Lorenzo Fernández Maimó, Alberto Huertas Celdrán, and Félix J. García Clemente. 2020. MADICS: A methodology for anomaly detection in industrial control systems. Symmetry 12, 10 (2020), 1583.
[66]
Rui Pinto, Gil Gonçalves, Jerker Delsing, and Eduardo Tovar. 2022. Enabling data-driven anomaly detection by design in cyber-physical production systems. Cybersecur. 5, 1 (2022), 9.
[67]
Cunlai Pu and Pang Wu. 2019. Vulnerability assessment of power grids based on both topological and electrical properties. arXiv:1909.05789. Retrieved from https://arxiv.org/abs/1909.05789
[68]
Wenyi Qian, Xin Peng, Bihuan Chen, John Mylopoulos, Huanhuan Wang, and Wenyun Zhao. 2014. Rationalism with a dose of empiricism: Case-based reasoning for requirements-driven self-adaptation. In Proceedings of the IEEE 22nd International Requirements Engineering Conference, RE 2014, Karlskrona, Sweden, August 25–29, 2014. IEEE Computer Society, 113–122.
[69]
Mazeiar Salehie and Ladan Tahvildari. 2009. Self-adaptive software: Landscape and research challenges. ACM Trans. Auton. Adapt. Syst. 4, 2 (2009), 14:1–14:42.
[70]
Aaron Schlenker, Omkar Thakoor, Haifeng Xu, Fei Fang, Milind Tambe, Long Tran-Thanh, Phebe Vayanos, and Yevgeniy Vorobeychik. 2018. Deceiving cyber adversaries: A game theoretic approach. In Proceedings of the 17th International Conference on Autonomous Agents and MultiAgent Systems, AAMAS 2018, Stockholm, Sweden, July 10–15, 2018. International Foundation for Autonomous Agents and Multiagent Systems Richland, SC, USA/ACM, 892–900.
[71]
Lloyd S. Shapley. 2016. A value for n-person games Contributions to the Theory of Games (AM-28), Princeton University Press 2, 17 (2016), 307–318.
[72]
Siddhant Shrivastava, Francisco Furtado, Mark Goh, and Aditya Mathur. 2022. The design of cyber-physical exercises (CPXS). In Proceedings of the 14th International Conference on Cyber Conflict: Keep Moving!, CyCon 2022, Tallinn, Estonia, May 31 – June 3, 2022. IEEE, 348–366.
[73]
Milind Tambe. 2012. Security and Game Theory - Algorithms, Deployed Systems, Lessons Learned. Cambridge University Press.
[74]
Robert Endre Tarjan. 1975. Efficiency of a good but not linear set union algorithm. J. ACM 22, 2 (1975), 215–225.
[75]
Christos Tsigkanos, Liliana Pasquale, Carlo Ghezzi, and Bashar Nuseibeh. 2018. On the interplay between cyber and physical spaces for adaptive security. IEEE Trans. Dependable Secur. Comput. 15, 3 (2018), 466–480. DOI:
[76]
Marten van Dijk, Ari Juels, Alina Oprea, and Ronald L. Rivest. 2013. FlipIt: The game of “stealthy takeover”. J. Cryptology 26, 4 (2013), 655–713. DOI:
[77]
Danny Weyns. 2020. An Introduction to Self-adaptive Systems: A Contemporary Software Engineering Perspective. John Wiley and Sons.
[78]
Danny Weyns, M. Usman Iftikhar, and Joakim Söderlund. 2013. Do external feedback loops improve the design of self-adaptive systems? a controlled experiment. In Proceedings of the 8th International Symposium on Software Engineering for Adaptive and Self-Managing Systems, SEAMS 2013, San Francisco, CA, USA, May 20–21, 2013. 3–12.
[79]
Danny Weyns, Sam Malek, and Jesper Andersson. 2012. FORMS: Unifying reference model for formal specification of distributed self-adaptive systems. ACM Trans. Auton. Adapt. Syst. 7, 1 (2012), 8:1–8:61.
[80]
Youngmin Jung and Mokdong Chung. 2010. Adaptive security management model in the cloud computing environment. In Proceedings of the 2010 12th International Conference on Advanced Communication Technology (ICACT). 1664–1669.
[81]
Eric Yuan, Naeem Esfahani, and Sam Malek. 2014. A systematic survey of self-protecting software systems. ACM Trans. Auton. Adapt. Syst. 8, 4 (2014), 17:1–17:41.
[82]
Tianqi Zhao, Wei Zhang, Haiyan Zhao, and Zhi Jin. 2017. A reinforcement learning-based framework for the generation and evolution of adaptation rules. In Proceedings of the 2017 IEEE International Conference on Autonomic Computing, ICAC 2017, Columbus, OH, USA, July 17–21, 2017. IEEE Computer Society, 103–112.
[83]
Quanyan Zhu and Tamer Basar. 2011. Robust and resilient control design for cyber-physical systems with an application to power systems. In Proceedings of the 50th IEEE Conference on Decision and Control and European Control Conference, 11th European Control Conference, CDC/ECC 2011, Orlando, FL, USA, December 12–15, 2011. IEEE, 4066–4071.

Cited By

View all
  • (2024)Generative AI for Self-Adaptive Systems: State of the Art and Research RoadmapACM Transactions on Autonomous and Adaptive Systems10.1145/368680319:3(1-60)Online publication date: 30-Sep-2024

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Transactions on Autonomous and Adaptive Systems
ACM Transactions on Autonomous and Adaptive Systems  Volume 19, Issue 2
June 2024
152 pages
EISSN:1556-4703
DOI:10.1145/3613544
Issue’s Table of Contents

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 20 April 2024
Online AM: 22 March 2024
Accepted: 13 March 2024
Revised: 08 March 2024
Received: 27 July 2023
Published in TAAS Volume 19, Issue 2

Check for updates

Author Tags

  1. Software-intensive systems
  2. game theory
  3. self-adaptation
  4. software security

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)245
  • Downloads (Last 6 weeks)37
Reflects downloads up to 04 Oct 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Generative AI for Self-Adaptive Systems: State of the Art and Research RoadmapACM Transactions on Autonomous and Adaptive Systems10.1145/368680319:3(1-60)Online publication date: 30-Sep-2024

View Options

Get Access

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Full Text

View this article in Full Text.

Full Text

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media