E-Books durchsuchen

Decision and Game Theory for Security [2018]

1
Impact of Privacy on Free Online Service Markets
2
Cyber-Warranties as a Quality Signal for Information Security Products
3
Game Theoretic Security Framework for Quantum Key Distribution
4
Training Set Camouflage
5
Multi-stage Dynamic Information Flow Tracking Game
6
Less is More: Culling the Training Set to Improve Robustness of Deep Neural Networks
7
Optimal Placement of Honeypots for Network Defense
8
Perfectly Secure Message Transmission Against Rational Timid Adversaries
9
Reinforcement Learning for Autonomous Defence in Software-Defined Networking
10
Colonel Blotto Game with Coalition Formation for Sharing Resources
11
Data Poisoning Attacks in Contextual Bandits
12
Analysis and Computation of Adaptive Defense Strategies Against Advanced Persistent Threats for Cyber-Physical Systems
13
Multi-sided Advertising Markets: Dynamic Mechanisms and Incremental User Compensations
14
A Game-Theoretic Analysis of the Adversarial Boyd-Kuramoto Model
15
A Game Theoretic Analysis of the Twitter Follow-Unfollow Mechanism
16
Game Theoretic Analysis of a Byzantine Attacker in Vehicular Mix-Zones
17
Distributed Aggregative Games on Graphs in Adversarial Environments
18
Disappointment-Aversion in Security Games
19
Moving Target Defense for the Placement of Intrusion Detection Systems in the Cloud
20
Approximating Power Indices to Assess Cybersecurity Criticality
21
A Differentially Private and Truthful Incentive Mechanism for Traffic Offload to Public Transportation
22
Deep Learning Based Game-Theoretical Approach to Evade Jamming Attacks
23
Towards Scientific Incident Response
24
Rational Trust Modeling
25
Scaling-Up Stackelberg Security Games Applications Using Approximations
26
A Learning and Masking Approach to Secure Learning
27
Towards True Decentralization: A Blockchain Consensus Protocol Based on Game Theory and Randomness
28
A Game Theoretical Framework for Inter-process Adversarial Intervention Detection
29
Cyber-Insurance as a Signaling Game: Self-reporting and External Security Audits
30
A Bayesian Multi-armed Bandit Approach for Identifying Human Vulnerabilities
31
Hypothesis Testing Game for Cyber Deception
32
Algorithms for Subgame Abstraction with Applications to Cyber Defense
33
A Two-Stage Deception Game for Network Defense
34
Imbalanced Collusive Security Games
35
A Robust Optimization Approach to Designing Near-Optimal Strategies for Constant-Sum Monitoring Games
36
An Initial Study of Targeted Personality Models in the FlipIt Game
Feedback