نتایج جستجو برای: security game
تعداد نتایج: 279601 فیلتر نتایج به سال:
Developments in Syria have been one of the most important events that have influenced the foreign policy and consequently, national security of Islamic Republic of Iran in a way that Syria’s condition has become a game with numbers for Iran and any fundamental development in its political structure significantly influence Iran’s security. For years, Syria has had the role of a gate for Iran to ...
this study sought to examine the effect of cooperative game on iranian students achievements in english alphabet learning. cooperative games are games, in which players or teams work together towards a common goal without defeating someone. the methodology used in this study was experimental. the population of the study was 60 female students from the grade one in secondary school in tabriz, ir...
Security is a critical concern around the world. In many domains from cyber-security to sustainability, limited security resources prevent complete security coverage at all times. Instead, these limited resources must be scheduled (or allocated or deployed), while simultaneously taking into account the importance of different targets, the responses of the adversaries to the security posture, an...
One of the emerging requirements for learning in the enterprise is finding new ways to keep the learner engaged. The use of advanced learning technologies that exploit a gameful design should increase engagement and encourage students to make connections between the simulated environment and the real world. This article presents game design guidelines for the development of an Educational Adven...
A general lack of awareness about computer security contributes to the insecurity of new consumer technologies. We seek to increase people’s prioritization of computer security and their understanding of the variety of attacks and technologies that can be vulnerable to compromise. We work towards this goal via fun: more specifically, via a recreational tabletop card game where people play as wh...
A general lack of awareness about computer security contributes to the insecurity of new consumer technologies. We seek to increase people’s prioritization of computer security and their understanding of the variety of attacks and technologies that can be vulnerable to compromise. We work towards this goal via fun: more specifically, via a recreational tabletop card game where people play as wh...
A legitimate contents sharing is an essential functionality of DRM (Digital Rights Management)-enabling contents industry and its value chain extension. In order to effectively choose and deploy some typical security policies in a contents sharing scenario, we introduced game theory to analysis the mutual influence of adoptions of trusted computing enabling enhanced security policies on benefit...
Behavioural intrusion detection is a frequently used for insuring network security. We expend behaviour based intrusion detection approach to a new domain of game networks. Specifically, our research shows that a behavioural biometric signature can be generated based on the strategy used by an individual to play a game. We wrote software capable of automatically extracting behavioural profiles ...
The game-playing technique is a powerful tool for analyzing cryptographic constructions. We illustrate this by using games as the central tool for proving security of three-key tripleencryption, a long-standing open problem. Our result, which is in the ideal-cipher model, demonstrates that for DES parameters (56-bit keys and 64-bit plaintexts) an adversary’s maximal advantage is small until it ...
Game theory is one of the most powerful mathematical tools to model information security decision-making. However, in game theory it is assumed that all the players have complete knowledge about each player’s strategies, preferences, and decision rules used. This assumption is very strong, in reality there is often significant information asymmetry between players. In many real world situations...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید