Details: Principles of behavioral game theory – specifically the concept of level-k thinking – is employed to construct a database of potential attack vectors. By observing the state trajectories under sequential interactions with different adversaries, the defender adaptively estimates both the number and the profiles of the different attack signals using an online deterministic annealing approach.
Keywords: CPS Security, Bounded Rationality, Attack Identification