نتایج جستجو برای: security game

تعداد نتایج: 279601  

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تربیت مدرس 1389

abstract: country’s fiber optic network, as one of the most important communication infrastructures, is of high importance; therefore, ensuring security of the network and its data is essential. no remarkable research has been done on assessing security of the country’s fiber optic network. besides, according to an official statistics released by ertebatat zirsakht company, unwanted disconnec...

Journal: :CoRR 2011
Stephen Mohr Syed Rahman

IT security issues are an important aspect for each and every organization within the video game industry. Within the video game industry alone, you might not normally think of security risks being an issue. But as we can and have seen in recent news, no c big or how small. While each of these common security issues that can and do address those security issues,one of the current leading video ...

Journal: :CoRR 2017
Nicholas Micallef Nalin Asanka Gamagedara Arachchilage

Security questions are one of the techniques used to recover passwords. The main limitation of security questions is that users find strong answers difficult to remember. This leads users to trade-off security for the convenience of an improved memorability. Previous research found that increased fun and enjoyment can lead to an enhanced memorability, which provides a better learning experience...

Journal: :IACR Cryptology ePrint Archive 2016
Haruna Higo Keisuke Tanaka Akihiro Yamada Kenji Yasunaga

Asharov, Canetti, and Hazay (Eurocrypt 2011) studied how game-theoretic concepts can be used to capture the cryptographic properties of correctness, privacy, and fairness in two-party protocols for failstop adversaries. In this work, we further study the characterization of the cryptographic properties of specific two-party protocols, oblivious transfer (OT) and commitment, in terms of game the...

2013
Mark A. Gondree Zachary N. J. Peterson

We motivate using non-digital games to teach computer security concepts and describe the inspirations driving the design of our board game, [d0x3d!]. We describe our experiences in designing game mechanics that teach security principles and our observations in developing an open-source game product. We survey our experiences with playing the game with students and our plans for supporting the g...

2009
GU Chun-Xiang Guang Yan ZHU Yue-Fei

Abstract:Probable security is an important criteria for analyzing the security of cryptographic protocols. However, writing and verifying proofs by hand are prone to errors. This paper introduces the game-based approach of writing security proofs and its automatic technique. It advocates the automatic security proof approach based on process calculus, and presents the initial game and observati...

2010
Saurabh Amin Galina Schwartz S. Shankar Sastry

This paper studies the security choices of identical plantcontroller systems, when their security is interdependent due the exposure to network induced risks. Each plant ismodeled by a discrete-time stochastic linear system, which is sensed and controlled over a communication network. We model security decisions of the individual systems (also called players) as a game. We consider a two-stage ...

Journal: :CoRR 2016
Sinong Wang Fang Liu Ness B. Shroff

Strategically allocating resources to protect targets against potential threats in an efficient way is a key challenge facing our society. From the classical interdiction game to the recently proposed Stackelberg Security Game, applying computational game models to the security domain has made a real-world impact on numerous fields including military attack and defense, financial system securit...

Journal: :International Journal of Communications, Network and System Sciences 2017

Journal: :International Journal of Autonomous and Adaptive Communications Systems 2008

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید