Designing game-theoretic security strategies for large public events

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Game-Theoretic Resource Allocation for Protecting Large Public Events

High profile large scale public events are attractive targets for terrorist attacks. The recent Boston Marathon bombings on April 15, 2013 have further emphasized the importance of protecting public events. The security challenge is exacerbated by the dynamic nature of such events: e.g., the impact of an attack at different locations changes over time as the Boston marathon participants and spe...

متن کامل

A Game-Theoretic Approach for Designing Mixed Mutation Strategies

Different mutation operators have been proposed in evolutionary programming. A mixture of various mutation operators may be more efficient than a single one. This paper presents a game-theoretic approach for designing evolutio nary programming with a mixed mutation strategy. The approach is applied to design a mixed strategy using Gaussian and Cauchy mutations. The experimental results show the...

متن کامل

Designing for Maintenance: a Game Theoretic Approach

Maintenance management is the effective and economical use of resources to keep equipment in, or restore it to, a serviceable condition. In this paper, maintenance considerations are introduced during product design using a game theoretic approach. Specifically, a product designer and a maintenance manager are modeled as two players in a Leader–Follower game, and strategies for designing produc...

متن کامل

Game- heoretic Resource Allocation for Protecting Large Public Events

High profile large scale public events are attractive targets for terrorist attacks. The recent Boston Marathon bombings on April 15, 2013 have further emphasized the importance of protecting public events. The security challenge is exacerbated by the dynamic nature of such events: e.g., the impact of an attack at different locations changes over time as the Boston marathon participants and spe...

متن کامل

Game-Theoretic Security for Two-Party Protocols

Asharov, Canetti, and Hazay (Eurocrypt 2011) studied how game-theoretic concepts can be used to capture the cryptographic properties of correctness, privacy, and fairness in two-party protocols for failstop adversaries. In this work, we further study the characterization of the cryptographic properties of specific two-party protocols, oblivious transfer (OT) and commitment, in terms of game the...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: SCIENTIA SINICA Informationis

سال: 2017

ISSN: 1674-7267

DOI: 10.1360/n112016-00088