找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Decision and Game Theory for Security; 14th International C Jie Fu,Tomas Kroupa,Yezekael Hayel Conference proceedings 2023 The Editor(s) (i

[复制链接]
楼主: 作业
发表于 2025-3-28 15:10:45 | 显示全部楼层
Observable Perfect Equilibriumtermine how to select between them in order to create real strategic agents. Several Nash equilibrium refinement concepts have been proposed and studied for sequential imperfect-information games, the most prominent being trembling-hand perfect equilibrium, quasi-perfect equilibrium, and recently on
发表于 2025-3-28 18:55:56 | 显示全部楼层
Does Cyber-Insurance Benefit the Insured or the Attacker? – A Game of Cyber-Insurance breaches. The rapid expansion of cyber-insurance in recent years hints the strong demand for cyber-insurance and its benefits. However, the impacts of cyber-insurance practice on cybersecurity enhancement and cyber-attackers are largely unknown. In this paper we study the optimal cybersecurity inve
发表于 2025-3-29 01:45:01 | 显示全部楼层
Rule Enforcing Through Orderingarge number of individuals. Common practice is to give each individual a chance to suffer a smaller . and be guaranteed to avoid the legal process with probable considerably larger punishment. However, thanks to the large number of offenders and a limited capacity of the central authority, the indiv
发表于 2025-3-29 04:35:57 | 显示全部楼层
发表于 2025-3-29 09:35:51 | 显示全部楼层
发表于 2025-3-29 14:46:01 | 显示全部楼层
Shades of Grey: Strategic Bimatrix Stopping Games for Modelling (Un)Ethical Hacking Roles an ethical to an unethical hacking role to disclose or exploit the vulnerabilities for malicious benefit. This paper focuses on the emerging topic of game-theoretical modelling of the phenomenon of grey-hat hackers. A two-player complete information bimatrix game is designed to capture the strategi
发表于 2025-3-29 17:16:09 | 显示全部楼层
Characterizing and Improving the Robustness of Predict-Then-Optimize Frameworksrk shows the traditional predict-then-optimize (PTO) framework can be improved by training a predictive model with respect to the optimization task through a PTO paradigm called . Little is known, however, about the performance of traditional PTO and decision-focused learning when exposed to .. We p
发表于 2025-3-29 22:40:42 | 显示全部楼层
Quantisation Effects in Adversarial Cyber-Physical Gamesaluate nonconvex game dynamics. Complex adversarial security games often exhibit nonconvex behaviour such as those admitted by a Kuramoto-Sakaguchi system with Lanchester dynamics. We pose this system as a two-player, zero-sum dynamic security game, where players seek to gain a decision advantage ov
发表于 2025-3-30 02:40:39 | 显示全部楼层
Scalable Learning of Intrusion Response Through Recursive Decompositiond stochastic game. To solve the game we follow an approach where attack and defense strategies co-evolve through reinforcement learning and self-play toward an equilibrium. Solutions proposed in previous work prove the feasibility of this approach for small infrastructures but do not scale to realis
发表于 2025-3-30 06:58:02 | 显示全部楼层
Honeypot Allocation for Cyber Deception in Dynamic Tactical Networks: A Game Theoretic Approach assets. Careful strategic placement of honeypots in networks should consider not only network aspects but also attackers’ preferences. The allocation of honeypots in tactical networks under network mobility is of great interest. To achieve this objective, we present a game-theoretic approach that g
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-25 16:01
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表