نتایج جستجو برای: security game
تعداد نتایج: 279601 فیلتر نتایج به سال:
Security is a critical concern around the world. In many domains from counter-terrorism to sustainability, limited security resources prevent complete security coverage at all times. Instead, these limited resources must be scheduled (or allocated or deployed), while simultaneously taking into account the importance of different targets, the responses of the adversaries to the security posture,...
In the game-playing technique, one writes a pseudocode game such that an adversary’s advantage in attacking some cryptographic construction is bounded above by the probability that the game sets a flag bad. This probability is then upper bounded by making stepwise, syntactical refinements to the pseudocode—a chain of games. The approach was first used by Kilian and Rogaway (1996) and has been u...
Global threats of terrorism, drug-smuggling, and other crimes have led to a significant increase in the need to deploy limited security resources to maximize their effectiveness. Game theory provides a sound mathematical approach for such effective deployment of limited security resources. A typical resulting approach is to randomize security schedules to avoid predictability, taking into accou...
Game-based proofs are a common technique used to verify cryptographic constructions. Such proofs consist of a sequence of games where each transition from one game to the next can be individually verified. However, as more and more increasingly complex proofs are being published, even such transitions are often non-trivial. Moreover, games are frequently described informally or just in some ad-...
The major factors of insecurity in the East, away from the security of geopolitical area were because of the formation of political management in the nineteenth century colonial style. The security factor in the vast region of the East that encompasses at least three countries of Iran and Afghanistan and Pakistan is very important and highly effective. It reached its peak colonial Anglo-Russian...
An important element in the mathematical and scientific foundations for security is modeling the strategic use of deception and information manipulation. We argue that game theory provides an important theoretical framework for reasoning about information manipulation in adversarial settings, including deception and randomization strategies. In addition, game theory has practical uses in determ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید