能干 发表于 2025-3-21 17:28:18

书目名称Decision and Game Theory for Security影响因子(影响力)<br>        http://figure.impactfactor.cn/if/?ISSN=BK0264332<br><br>        <br><br>书目名称Decision and Game Theory for Security影响因子(影响力)学科排名<br>        http://figure.impactfactor.cn/ifr/?ISSN=BK0264332<br><br>        <br><br>书目名称Decision and Game Theory for Security网络公开度<br>        http://figure.impactfactor.cn/at/?ISSN=BK0264332<br><br>        <br><br>书目名称Decision and Game Theory for Security网络公开度学科排名<br>        http://figure.impactfactor.cn/atr/?ISSN=BK0264332<br><br>        <br><br>书目名称Decision and Game Theory for Security被引频次<br>        http://figure.impactfactor.cn/tc/?ISSN=BK0264332<br><br>        <br><br>书目名称Decision and Game Theory for Security被引频次学科排名<br>        http://figure.impactfactor.cn/tcr/?ISSN=BK0264332<br><br>        <br><br>书目名称Decision and Game Theory for Security年度引用<br>        http://figure.impactfactor.cn/ii/?ISSN=BK0264332<br><br>        <br><br>书目名称Decision and Game Theory for Security年度引用学科排名<br>        http://figure.impactfactor.cn/iir/?ISSN=BK0264332<br><br>        <br><br>书目名称Decision and Game Theory for Security读者反馈<br>        http://figure.impactfactor.cn/5y/?ISSN=BK0264332<br><br>        <br><br>书目名称Decision and Game Theory for Security读者反馈学科排名<br>        http://figure.impactfactor.cn/5yr/?ISSN=BK0264332<br><br>        <br><br>

Interdict 发表于 2025-3-21 20:45:33

Learning and Planning in the Feature Deception Problemender’s loss by misleading the attacker to make suboptimal decisions. In order to formally reason about deception, we introduce the ., a domain-independent model and present a learning and planning framework for finding the optimal deception strategy, taking into account the adversary’s preferences

Osmosis 发表于 2025-3-22 02:40:18

http://reply.papertrans.cn/27/2644/264332/264332_3.png

Counteract 发表于 2025-3-22 07:35:48

http://reply.papertrans.cn/27/2644/264332/264332_4.png

paroxysm 发表于 2025-3-22 12:19:30

http://reply.papertrans.cn/27/2644/264332/264332_5.png

incision 发表于 2025-3-22 13:45:16

Exploiting Bounded Rationality in Risk-Based Cyber Camouflage Games optimize a deceptive defense based on camouflaging network and system attributes, have shown effective numerical results on simulated data. However, these models possess a fundamental drawback due to the assumption that an attempted attack is always successful—as a direct consequence of the decepti

incision 发表于 2025-3-22 17:50:38

http://reply.papertrans.cn/27/2644/264332/264332_7.png

珊瑚 发表于 2025-3-22 22:54:38

http://reply.papertrans.cn/27/2644/264332/264332_8.png

insolence 发表于 2025-3-23 04:48:42

http://reply.papertrans.cn/27/2644/264332/264332_9.png

Abjure 发表于 2025-3-23 09:34:55

http://reply.papertrans.cn/27/2644/264332/264332_10.png
页: [1] 2 3 4 5 6
查看完整版本: Titlebook: Decision and Game Theory for Security; 11th International C Quanyan Zhu,John S. Baras,Juntao Chen Conference proceedings 2020 Springer Natu