E-Books durchsuchen
Decision and Game Theory for Security [2018]
- 1
-
Impact of Privacy on Free Online Service Markets
- 2
-
Cyber-Warranties as a Quality Signal for Information Security Products
- 3
-
Game Theoretic Security Framework for Quantum Key Distribution
- 4
-
Training Set Camouflage
- 5
-
Multi-stage Dynamic Information Flow Tracking Game
- 6
-
Less is More: Culling the Training Set to Improve Robustness of Deep Neural Networks
- 7
-
Optimal Placement of Honeypots for Network Defense
- 8
-
Perfectly Secure Message Transmission Against Rational Timid Adversaries
- 9
-
Reinforcement Learning for Autonomous Defence in Software-Defined Networking
- 10
-
Colonel Blotto Game with Coalition Formation for Sharing Resources
- 11
-
Data Poisoning Attacks in Contextual Bandits
- 12
-
Analysis and Computation of Adaptive Defense Strategies Against Advanced Persistent Threats for Cyber-Physical Systems
- 13
-
Multi-sided Advertising Markets: Dynamic Mechanisms and Incremental User Compensations
- 14
-
A Game-Theoretic Analysis of the Adversarial Boyd-Kuramoto Model
- 15
-
A Game Theoretic Analysis of the Twitter Follow-Unfollow Mechanism
- 16
-
Game Theoretic Analysis of a Byzantine Attacker in Vehicular Mix-Zones
- 17
-
Distributed Aggregative Games on Graphs in Adversarial Environments
- 18
-
Disappointment-Aversion in Security Games
- 19
-
Moving Target Defense for the Placement of Intrusion Detection Systems in the Cloud
- 20
-
Approximating Power Indices to Assess Cybersecurity Criticality
- 21
-
A Differentially Private and Truthful Incentive Mechanism for Traffic Offload to Public Transportation
- 22
-
Deep Learning Based Game-Theoretical Approach to Evade Jamming Attacks
- 23
-
Towards Scientific Incident Response
- 24
-
Rational Trust Modeling
- 25
-
Scaling-Up Stackelberg Security Games Applications Using Approximations
- 26
-
A Learning and Masking Approach to Secure Learning
- 27
-
Towards True Decentralization: A Blockchain Consensus Protocol Based on Game Theory and Randomness
- 28
-
A Game Theoretical Framework for Inter-process Adversarial Intervention Detection
- 29
-
Cyber-Insurance as a Signaling Game: Self-reporting and External Security Audits
- 30
-
A Bayesian Multi-armed Bandit Approach for Identifying Human Vulnerabilities
- 31
-
Hypothesis Testing Game for Cyber Deception
- 32
-
Algorithms for Subgame Abstraction with Applications to Cyber Defense
- 33
-
A Two-Stage Deception Game for Network Defense
- 34
-
Imbalanced Collusive Security Games
- 35
-
A Robust Optimization Approach to Designing Near-Optimal Strategies for Constant-Sum Monitoring Games
- 36
-
An Initial Study of Targeted Personality Models in the FlipIt Game