E-Books durchsuchen

Decision and Game Theory for Security [2023]

1
Observable Perfect Equilibrium
1
The Risk of Attacker Behavioral Learning: Can Attacker Fool Defender Under Uncertainty?
2
Casino Rationale: Countering Attacker Deception in Zero-Sum Stackelberg Security Games of Bounded Rationality
2
Does Cyber-Insurance Benefit the Insured or the Attacker? – A Game of Cyber-Insurance
3
Rule Enforcing Through Ordering
3
Cyber Deception Against Zero-Day Attacks: A Game Theoretic Approach
4
Multi-defender Security Games with Schedules
4
On Almost-Sure Intention Deception Planning that Exploits Imperfect Observers
5
Asymmetric Centrality Game Against Network Epidemic Propagation
5
Using Deception in Markov Game to Understand Adversarial Behaviors Through a Capture-The-Flag Environment
6
Robust Moving Target Defense Against Unknown Attacks: A Meta-reinforcement Learning Approach
6
Shades of Grey: Strategic Bimatrix Stopping Games for Modelling (Un)Ethical Hacking Roles
7
Synchronization in Security Games
7
Characterizing and Improving the Robustness of Predict-Then-Optimize Frameworks
8
Multiple Oracle Algorithm to Solve Continuous Games
8
Quantisation Effects in Adversarial Cyber-Physical Games
9
Optimal Pursuit of Surveilling Agents Near a High Value Target
9
Scalable Learning of Intrusion Response Through Recursive Decomposition
10
On Poisoned Wardrop Equilibrium in Congestion Games
10
Honeypot Allocation for Cyber Deception in Dynamic Tactical Networks: A Game Theoretic Approach
11
Reward Delay Attacks on Deep Reinforcement Learning
11
Optimal Resource Allocation for Proactive Defense with Deception in Probabilistic Attack Graphs
12
An Exploration of Poisoning Attacks on Data-Based Decision Making
12
The Credential is Not Enough: Deception with Honeypots and Fake Credentials
13
A Network Centrality Game for Epidemic Control
13
Playing Repeated Coopetitive Polymatrix Games with Small Manipulation Cost
14
Optimizing Intrusion Detection Systems Placement Against Network Virus Spreading Using a Partially Observable Stochastic Minimum-Threat Path Game
14
Rational Broadcast Protocols Against Timid Adversaries
15
FlipPath Game to Counter Stealthy Attacks in SDN-Based Tactical Networks
15
Voting Games to Model Protocol Stability and Security of Proof-of-Work Cryptocurrencies
16
Double-Sided Information Asymmetry in Double Extortion Ransomware
17
Opacity-Enforcing Active Perception and Control Against Eavesdropping Attacks
18
A Game-Theoretic Analysis of Auditing Differentially Private Algorithms with Epistemically Disparate Herd
19
Modeling and Analysis of a Nonlinear Security Game with Mixed Armament
Feedback