A Dempster‐Shafer theory and uninorm‐based framework of reasoning and multiattribute decision‐making for surveillance system
Closed‐circuit television and sensor‐based intelligent surveillance systems have attracted
considerable attentions in the field of public security affairs. To provide real‐time reaction in …
considerable attentions in the field of public security affairs. To provide real‐time reaction in …
Cost-Efficient Network Protection Games Against Uncertain Types of Cyber-Attackers
Z Xu, M Baykal-Gürsoy - 2022 IEEE International Symposium …, 2022 - ieeexplore.ieee.org
This paper considers network protection games for a heterogeneous network system with N
nodes against cyber-attackers of two different types of intentions. The first type tries to …
nodes against cyber-attackers of two different types of intentions. The first type tries to …
[HTML][HTML] Variational preferences and equilibria in games under ambiguous belief correspondences
G De Marco, M Romaniello - International Journal of Approximate …, 2015 - Elsevier
Variational preferences have been introduced to study the robustness of macroeconomic
models with respect to ambiguity. The Decision Theory literature has shown that this family …
models with respect to ambiguity. The Decision Theory literature has shown that this family …
Games played under fuzzy constraints
Psychological experiment studies reveal that human interaction behaviors are often not the
same as what game theory predicts. One of important reasons is that they did not put …
same as what game theory predicts. One of important reasons is that they did not put …
Ambiguous bayesian games
Bayesian games can handle the incomplete information about players' types. However, in
real life, the information could be not only incomplete but also ambiguous for lack of …
real life, the information could be not only incomplete but also ambiguous for lack of …
Efficient network protection games against multiple types of strategic attackers
Z Xu, M Baykal-Gürsoy - ICASSP 2021-2021 IEEE International …, 2021 - ieeexplore.ieee.org
This paper considers network protection games against different types of attackers for a
heterogeneous network system with N units. A defender, by applying resources to …
heterogeneous network system with N units. A defender, by applying resources to …
Matrix games with missing, interval, and ambiguous lottery payoffs of pure strategy profiles and compound strategy profiles
W Ma, X Luo, Y Jiang - International Journal of Intelligent …, 2018 - Wiley Online Library
In a matrix game, the interactions among players are based on the assumption that each
player has accurate information about the payoffs of their interactions and the other players …
player has accurate information about the payoffs of their interactions and the other players …
A game model with private goal and belief
G Wu, X Luo, Q Zhong - PRICAI 2014: Trends in Artificial Intelligence: 13th …, 2014 - Springer
In real life, it is difficult to hold some assumptions of the classic game theory. For example,
when a player of a game chooses a strategy, it should consider not only payoff from taking …
when a player of a game chooses a strategy, it should consider not only payoff from taking …
A decision support framework for security resource allocation under ambiguity
There has been increasing interest in using Stackelberg game (known as a security game)
to allocate limited security resources against different attacker types with a specific …
to allocate limited security resources against different attacker types with a specific …
[PDF][PDF] Security games with partial surveillance.
Security games are used to deploy limited security resources. Much work on the topic
assumes that attackers have the perfect knowledge of defenders' strategies. However, it is …
assumes that attackers have the perfect knowledge of defenders' strategies. However, it is …