Search results

From MaRDI portal
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)
  • random numbers using many inputs and more post-processing 2021-03-12 Paper A strategy for quantum algorithm design assisted by machine learning 2021-01-12 Paper...
    10 bytes (17 words) - 23:42, 24 September 2023
  • Nonces 2020-07-01 Paper Security from the adversary's inertia-controlling convergence speed when playing mixed strategy equilibria 2018-12-10 Paper Risk assessment...
    10 bytes (16 words) - 22:14, 12 December 2023
  • Sufficiently Myopic Adversaries Are Blind 2020-01-28 Paper Function Computation Through a Bidirectional Relay 2019-01-28 Paper An MMSE Strategy at Relays With...
    10 bytes (18 words) - 15:49, 6 October 2023
  • decision making 2019-03-29 Paper Improving resource allocation strategies against human adversaries in security games: an extended study 2013-08-26 Paper...
    10 bytes (18 words) - 14:36, 11 December 2023
  • covariance matrix 2015-04-01 Paper A new \textit{a posteriori} parameter choice strategy for the convolution regularization of the space-fractional backward diffusion...
    10 bytes (17 words) - 14:19, 10 December 2023
  • 2013-03-13 Paper Classifier evaluation and attribute selection against active adversaries 2012-04-11 Paper When Do Firms Invest in Privacy-Preserving Technologies...
    10 bytes (17 words) - 20:12, 11 December 2023
  • Multiattribute Terrorist Utility 2018-10-24 Paper Expert Elicitation of Adversary Preferences Using Ordinal Judgments 2013-07-02 Paper Defending against...
    10 bytes (18 words) - 19:45, 6 October 2023
  • dissemination in dynamic rooted trees 2019-02-20 Paper On the strongest message adversary for consensus in directed dynamic networks 2019-01-30 Paper On knowledge...
    10 bytes (17 words) - 02:09, 10 December 2023
  • constructions 2010-08-03 Paper Security against covert adversaries: Efficient protocols for realistic adversaries 2010-03-01 Paper Collusion-Free Multiparty Computation...
    10 bytes (16 words) - 04:03, 25 September 2023
  • Deception 2022-05-16 Paper Evaluating Adaptive Deception Strategies for Cyber Defense with Human Adversaries 2022-05-16 Paper A game theoretic framework for software...
    10 bytes (17 words) - 09:18, 7 October 2023
  • Formations 2017-02-09 Paper A Zero-Sum Game Between the Network Designer and an Adversary in Consensus Protocols 2017-01-30 Paper A Double-Sided Jamming Game with...
    10 bytes (17 words) - 17:23, 8 December 2023
  • Deception Strategies for Cyber Defense with Human Adversaries 2022-05-16 Paper Rock-paper-scissors play: beyond the win-stay/lose-change strategy 2022-03-09...
    10 bytes (16 words) - 22:56, 24 September 2023
  • of Publication Type Evaluating Adaptive Deception Strategies for Cyber Defense with Human Adversaries 2022-05-16 Paper Exploiting bounded rationality in...
    10 bytes (16 words) - 22:56, 24 September 2023
  • Pruning algorithms for multi-model adversary search 1998-08-13 Paper Model-based learning of interaction strategies in multi-agent systems 1998-01-01 Paper...
    10 bytes (16 words) - 01:49, 9 December 2023
  • 2008-11-25 Paper Strategy Construction for Parity Games with Imperfect Information 2008-11-25 Paper Quantitative Languages 2008-11-20 Paper Strategy Logic 2008-09-18...
    10 bytes (17 words) - 15:16, 6 October 2023
  • Pruning algorithms for multi-model adversary search 1998-08-13 Paper Model-based learning of interaction strategies in multi-agent systems 1998-01-01 Paper...
    10 bytes (16 words) - 10:45, 24 September 2023
  • games 2023-08-02 Paper Security from the adversary's inertia-controlling convergence speed when playing mixed strategy equilibria 2018-12-10 Paper Book review...
    10 bytes (16 words) - 17:40, 24 September 2023
  • Deception 2022-05-16 Paper Evaluating Adaptive Deception Strategies for Cyber Defense with Human Adversaries 2022-05-16 Paper...
    10 bytes (16 words) - 22:58, 27 December 2023
  • games 2023-06-19 Paper Evaluating Adaptive Deception Strategies for Cyber Defense with Human Adversaries 2022-05-16 Paper Automated construction of bounded-loss...
    10 bytes (16 words) - 04:11, 7 October 2023
  • Intrusion 2020-07-20 Paper Security from the adversary's inertia-controlling convergence speed when playing mixed strategy equilibria 2018-12-10 Paper Risk assessment...
    10 bytes (16 words) - 10:27, 6 October 2023
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)