نتایج جستجو برای: security game

تعداد نتایج: 279601  

2015
Shyam Chandran

With the tremendous growth of network technology, network attackers are also rationally increased to disrupt the activities and hacking the data from the network users by the intruder. To provide the security from the intruder is most important one. Many researchers were proposed a different approach for providing security they does not tackle the problem, it leads an untruthful in the network....

2006
Benjamin D. Cone Michael F. Thompson Cynthia E. Irvine Thuy D. Nguyen

Although many of the concepts included in staff cyber-security awareness training are universal, such training often must be tailored to address the policies and requirements of a particular organization. In addition, many forms of training fail because they are rote and do not require users to think about and apply security concepts. A flexible, highly interactive video game, CyberCIEGE, is de...

2011
Benjamin Johnson Jens Grossklags Nicolas Christin John C.-I. Chuang

Motivated attackers cannot always be blocked or deterred. In the physical-world security context, examples include suicide bombers and sexual predators. In computer networks, zero-day exploits unpredictably threaten the information economy and end users. In this paper, we study the conflicting incentives of individuals to act in the light of such threats. More specifically, in the weakest targe...

Journal: :The Journal of Defense Modeling and Simulation: Applications, Methodology, Technology 2017

Journal: :European Journal of Operational Research 2019

Journal: :IEEE Transactions on Information Forensics and Security 2012

Journal: :Mathematics 2022

This research contributes to the security design of an advanced smart drone swarm network based on a variant Blockchain Governance Game (BGG), which is theoretical game model predict moments actions before attacks, and Strategic Alliance for (SABGG), one BGG variants has been adapted construct best strategies take preliminary strategic alliance protecting drones in blockchain-based network. Sma...

2017
Fei Miao Quanyan Zhu Miroslav Pajic George J. Pappas

In this paper, we establish a zero-sum, hybrid state stochastic game model for designing defense policies for cyber-physical systems against different types of attacks. With the increasingly integrated properties of cyber-physical systems (CPS) today, security is a challenge for critical infrastructures. Though resilient control and detecting techniques for a specific model of attack have been ...

2011
Michael F. Thompson Cynthia E. Irvine

Hands-on exercises promote active learning where student experience reinforces material presented in lectures or reading assignments [1]. Drawing the student into a meaningful context where student decisions have clear consequences strengthens the learning experience and thus improves the potential for internalization of knowledge. The CyberCIEGE video game was designed to confront students wit...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید