一美元 发表于 2025-3-30 09:50:12

Ransom Roulette: Learning the Games Behind Cyber Extortionr to unlock files after paying the ransom to prevent data loss. Simultaneously, the attacker can strategically decide whether or not to unlock the files after receiving payment. This can be modelled as a strategic game, repeated over time. In addition, the attacker may change their mind at any point

APNEA 发表于 2025-3-30 14:46:16

http://reply.papertrans.cn/29/2845/284487/284487_52.png

开玩笑 发表于 2025-3-30 20:01:58

http://reply.papertrans.cn/29/2845/284487/284487_53.png

痛恨 发表于 2025-3-30 23:02:32

Contested Logistics: A Game-Theoretic Approach goods in selected areas. We model this as a large two-player zero-sum one-shot game played on a graph representation of the physical world, with the optimal logistics plans described by the (possibly randomized) Nash equilibria of this game. Our logistics model is fairly sophisticated, and is able 
页: 1 2 3 4 5 [6]
查看完整版本: Titlebook: Decision and Game Theory for Security; 15th International C Arunesh Sinha,Jie Fu,Tao Zhang Conference proceedings 2025 The Editor(s) (if ap