一美元 发表于 2025-3-30 09:50:12
Ransom Roulette: Learning the Games Behind Cyber Extortionr to unlock files after paying the ransom to prevent data loss. Simultaneously, the attacker can strategically decide whether or not to unlock the files after receiving payment. This can be modelled as a strategic game, repeated over time. In addition, the attacker may change their mind at any pointAPNEA 发表于 2025-3-30 14:46:16
http://reply.papertrans.cn/29/2845/284487/284487_52.png开玩笑 发表于 2025-3-30 20:01:58
http://reply.papertrans.cn/29/2845/284487/284487_53.png痛恨 发表于 2025-3-30 23:02:32
Contested Logistics: A Game-Theoretic Approach goods in selected areas. We model this as a large two-player zero-sum one-shot game played on a graph representation of the physical world, with the optimal logistics plans described by the (possibly randomized) Nash equilibria of this game. Our logistics model is fairly sophisticated, and is able