Designing game-theoretic security strategies for large public events
نویسندگان
چکیده
منابع مشابه
Game-Theoretic Resource Allocation for Protecting Large Public Events
High profile large scale public events are attractive targets for terrorist attacks. The recent Boston Marathon bombings on April 15, 2013 have further emphasized the importance of protecting public events. The security challenge is exacerbated by the dynamic nature of such events: e.g., the impact of an attack at different locations changes over time as the Boston marathon participants and spe...
متن کاملA Game-Theoretic Approach for Designing Mixed Mutation Strategies
Different mutation operators have been proposed in evolutionary programming. A mixture of various mutation operators may be more efficient than a single one. This paper presents a game-theoretic approach for designing evolutio nary programming with a mixed mutation strategy. The approach is applied to design a mixed strategy using Gaussian and Cauchy mutations. The experimental results show the...
متن کاملDesigning for Maintenance: a Game Theoretic Approach
Maintenance management is the effective and economical use of resources to keep equipment in, or restore it to, a serviceable condition. In this paper, maintenance considerations are introduced during product design using a game theoretic approach. Specifically, a product designer and a maintenance manager are modeled as two players in a Leader–Follower game, and strategies for designing produc...
متن کاملGame- heoretic Resource Allocation for Protecting Large Public Events
High profile large scale public events are attractive targets for terrorist attacks. The recent Boston Marathon bombings on April 15, 2013 have further emphasized the importance of protecting public events. The security challenge is exacerbated by the dynamic nature of such events: e.g., the impact of an attack at different locations changes over time as the Boston marathon participants and spe...
متن کاملGame-Theoretic Security for Two-Party Protocols
Asharov, Canetti, and Hazay (Eurocrypt 2011) studied how game-theoretic concepts can be used to capture the cryptographic properties of correctness, privacy, and fairness in two-party protocols for failstop adversaries. In this work, we further study the characterization of the cryptographic properties of specific two-party protocols, oblivious transfer (OT) and commitment, in terms of game the...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: SCIENTIA SINICA Informationis
سال: 2017
ISSN: 1674-7267
DOI: 10.1360/n112016-00088