expire 发表于 2025-3-28 15:10:45

Observable Perfect Equilibriumtermine how to select between them in order to create real strategic agents. Several Nash equilibrium refinement concepts have been proposed and studied for sequential imperfect-information games, the most prominent being trembling-hand perfect equilibrium, quasi-perfect equilibrium, and recently on

发源 发表于 2025-3-28 18:55:56

Does Cyber-Insurance Benefit the Insured or the Attacker? – A Game of Cyber-Insurance breaches. The rapid expansion of cyber-insurance in recent years hints the strong demand for cyber-insurance and its benefits. However, the impacts of cyber-insurance practice on cybersecurity enhancement and cyber-attackers are largely unknown. In this paper we study the optimal cybersecurity inve

代替 发表于 2025-3-29 01:45:01

Rule Enforcing Through Orderingarge number of individuals. Common practice is to give each individual a chance to suffer a smaller . and be guaranteed to avoid the legal process with probable considerably larger punishment. However, thanks to the large number of offenders and a limited capacity of the central authority, the indiv

Communicate 发表于 2025-3-29 04:35:57

http://reply.papertrans.cn/27/2644/264321/264321_44.png

BUST 发表于 2025-3-29 09:35:51

http://reply.papertrans.cn/27/2644/264321/264321_45.png

纵欲 发表于 2025-3-29 14:46:01

Shades of Grey: Strategic Bimatrix Stopping Games for Modelling (Un)Ethical Hacking Roles an ethical to an unethical hacking role to disclose or exploit the vulnerabilities for malicious benefit. This paper focuses on the emerging topic of game-theoretical modelling of the phenomenon of grey-hat hackers. A two-player complete information bimatrix game is designed to capture the strategi

AWRY 发表于 2025-3-29 17:16:09

Characterizing and Improving the Robustness of Predict-Then-Optimize Frameworksrk shows the traditional predict-then-optimize (PTO) framework can be improved by training a predictive model with respect to the optimization task through a PTO paradigm called . Little is known, however, about the performance of traditional PTO and decision-focused learning when exposed to .. We p

lymphedema 发表于 2025-3-29 22:40:42

Quantisation Effects in Adversarial Cyber-Physical Gamesaluate nonconvex game dynamics. Complex adversarial security games often exhibit nonconvex behaviour such as those admitted by a Kuramoto-Sakaguchi system with Lanchester dynamics. We pose this system as a two-player, zero-sum dynamic security game, where players seek to gain a decision advantage ov

得罪 发表于 2025-3-30 02:40:39

Scalable Learning of Intrusion Response Through Recursive Decompositiond stochastic game. To solve the game we follow an approach where attack and defense strategies co-evolve through reinforcement learning and self-play toward an equilibrium. Solutions proposed in previous work prove the feasibility of this approach for small infrastructures but do not scale to realis

Malaise 发表于 2025-3-30 06:58:02

Honeypot Allocation for Cyber Deception in Dynamic Tactical Networks: A Game Theoretic Approach assets. Careful strategic placement of honeypots in networks should consider not only network aspects but also attackers’ preferences. The allocation of honeypots in tactical networks under network mobility is of great interest. To achieve this objective, we present a game-theoretic approach that g
页: 1 2 3 4 [5] 6
查看完整版本: Titlebook: Decision and Game Theory for Security; 14th International C Jie Fu,Tomas Kroupa,Yezekael Hayel Conference proceedings 2023 The Editor(s) (i