نتایج جستجو برای: security game

تعداد نتایج: 279601  

2009
Vicky Papadopoulou Lesta Andreas Gregoriades

Non-functional requirements (NFR) such as network security recently gained widespread attention in distributed information systems. Despite their importance however, there is no systematic approach to validate these requirements given the complexity and uncertainty characterizing modern networks. Traditionally, network security requirements specification has been the results of a reactive proce...

2004
Marc Dougherty

This paper describes our experiences in the design and implementation of a network for security training exercises, and one such exercise. The network described herein is flexible, and could be used for a wide variety of training exercises. Organizations of all sizes can use this type of exercise to train new personnel or keep existing staff at their best. In addition to the training benefits, ...

2014
Martin Chapman Gareth Tyson Peter McBurney Michael Luck Simon Parsons

In order to begin to solve many of the problems in the domain of cyber security, they must first be transformed into abstract representations, free of complexity and paralysing technical detail. We believe that for many classic security problems, a viable transformation is to consider them as an abstract game of hide-and-seek. The tools required in this game – such as strategic search and an ap...

2017
Frédéric Moisan Cleotilde Gonzalez

Game Theory is a common approach used to understand attacker and defender motives, strategies, and allocation of limited security resources. For example, many defense algorithms are based on game-theoretic solutions that conclude that randomization of defense actions assures unpredictability, creating difficulties for a human attacker. However, many game-theoretic solutions often rely on ideali...

Journal: :AI Magazine 2012
Bo An Eric Anyung Shieh Milind Tambe Rong Yang Craig Baldwin Joseph DiRenzo Ben Maule Garrett Meyer

While three deployed applications of game theory for security have recently been reported, we as a community of agents and AI researchers remain in the early stages of these deployments; there is a continuing need to understand the core principles for innovative security applications of game theory. Towards that end, this paper presents PROTECT, a gametheoretic system deployed by the United Sta...

2016
Benjamin Ford Amulya Yadav Amandeep Singh Matthew Brown Arunesh Sinha Biplav Srivastava Christopher Kiekintveld Nicole Sintov Milind Tambe John Thangarajah Karl Tuyls Stacy Marsella Catholijn Jonker

Leather is an integral part of the world economy and a substantial income source for developing countries. Despite government regulations on leather tannery waste emissions, inspection agencies lack adequate enforcement resources, and tanneries’ toxic wastewaters wreak havoc on surrounding ecosystems and communities. Previous works in this domain stop short of generating executable solutions fo...

2013
Nitesh Saxena Alexander Gallego Jonathan Voris

Securely associating, or“pairing,”wireless devices via out-ofband communication channels is a well established approach. Unfortunately, this technique is prone to human errors that lead to security problems such as man-in-the-middle attacks. To address this problem by motivating users, a previous proposal suggested the use of computer games. Games can make the pairing process rewarding, thus po...

Journal: :JNW 2006
Karin Sallhammar Bjarne E. Helvik Svein J. Knapskog

This paper presents a new approach to integrated security and dependability evaluation, which is based on stochastic modeling techniques. Our proposal aims to provide operational measures of the trustworthiness of a system, regardless if the underlying failure cause is intentional or not. By viewing system states as elements in a stochastic game, we can compute the probabilities of expected att...

2011
Oswaldo Aguirre Nicolas Lopez Eric Gutierrez Heidi A. Taboada Jose Epiritu Christopher Kiekintveld

Border security is a key element of national security policy for any sovereign nation. In the United States, the Border Patrol deploys thousands of agents integrated with technology (e.g., vehicles, cameras, sensors) and infrastructure (e.g., fences, checkpoints) to prevent illegal entry of people and goods into the country along vast land borders with Canada and Mexico. The problem of border s...

2017
Violeta Damjanovic-Behrendt

This paper presents an approach for optimal cyber security decisions to protect instances of a federated Internet of Things (IoT) platform in the cloud. The presented solution implements the repeated Stackelberg Security Game (SSG) and a model called Stochastic Human behaviour model with AttRactiveness and Probability weighting (SHARP). SHARP employs the Subjective Utility Quantal Response (SUQ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید