A survey on game-theoretic approaches for intrusion detection and response optimization
Intrusion Detection Systems (IDS) are key components for securing critical infrastructures,
capable of detecting malicious activities on networks or hosts. However, the efficiency of an …
capable of detecting malicious activities on networks or hosts. However, the efficiency of an …
Patrolling security games: Definition and algorithms for solving large instances with single patroller and single intruder
Security games are gaining significant interest in artificial intelligence. They are
characterized by two players (a defender and an attacker) and by a set of targets the …
characterized by two players (a defender and an attacker) and by a set of targets the …
[HTML][HTML] Adversarial patrolling with spatially uncertain alarm signals
When securing complex infrastructures or large environments, constant surveillance of every
area is not affordable. To cope with this issue, a common countermeasure is the usage of …
area is not affordable. To cope with this issue, a common countermeasure is the usage of …
The mysteries of security games: Equilibrium computation becomes combinatorial algorithm design
H Xu - Proceedings of the 2016 ACM Conference on …, 2016 - dl.acm.org
The security game is a basic model for resource allocation in adversarial environments.
Here there are two players, a defender and an attacker. The defender wants to allocate her …
Here there are two players, a defender and an attacker. The defender wants to allocate her …
Optimal patrol scheduling of hazardous pipelines using game theory
An approach based on game theory is proposed to schedule security patrolling for a
pipeline system. The method proposes numbers of patrolling paths according to the risk of …
pipeline system. The method proposes numbers of patrolling paths according to the risk of …
The role of inter-organizational information systems in maritime transport chains
Most global supply chains rely on maritime transport chains. Due to various organizations
involved in these chains, an intensive coordination is needed. Therefore, timely, cost …
involved in these chains, an intensive coordination is needed. Therefore, timely, cost …
Randomized security patrolling for link flooding attack detection
With the advancement of large-scale coordinated attacks, the adversary is shifting away from
traditional distributed denial of service (DDoS) attacks against servers to sophisticated …
traditional distributed denial of service (DDoS) attacks against servers to sophisticated …
On Stackelberg mixed strategies
V Conitzer - Synthese, 2016 - Springer
It is sometimes the case that one solution concept in game theory is equivalent to applying
another solution concept to a modified version of the game. In such cases, does it make …
another solution concept to a modified version of the game. In such cases, does it make …
Designing preferences, beliefs, and identities for artificial intelligence
V Conitzer - Proceedings of the AAAI Conference on Artificial …, 2019 - ojs.aaai.org
Research in artificial intelligence, as well as in economics and other related fields, generally
proceeds from the premise that each agent has a well-defined identity, well-defined …
proceeds from the premise that each agent has a well-defined identity, well-defined …
Optimal personalized defense strategy against man-in-the-middle attack
Abstract The Man-In-The-Middle (MITM) attack is one of the most common attacks employed
in the network hacking. MITM attackers can successfully invoke attacks such as denial of …
in the network hacking. MITM attackers can successfully invoke attacks such as denial of …