Abstract: Highlights•Defense model against stealthy intruders, without signaling or intrusion detection.•Two case studies from industrial real-life robots.•Model can use attack graphs with/without probabilities, exploit complexities, etc.•Coverage of attack/response patterns in continuous and discrete time.•Simplicity of implementation and adaptation.
Loading