Exploiting bounded rationality in risk-based cyber camouflage games
From MaRDI portal
Publication:2056937
DOI10.1007/978-3-030-64793-3_6zbMATH Open1483.68049OpenAlexW3116762312MaRDI QIDQ2056937FDOQ2056937
Authors: Omkar Thakoor, Shahin Jabbari, Palvi Aggarwal, Cleotilde Gonzalez, Milind Tambe, Phebe Vayanos
Publication date: 8 December 2021
Full work available at URL: https://doi.org/10.1007/978-3-030-64793-3_6
Recommendations
- You only lie twice: a multi-round cyber deception game of questionable veracity
- Learning Generative Deception Strategies in Combinatorial Masking Games
- Game theory on attack graph for cyber deception
- Harnessing the power of deception in attack graph-based security games
- Optimal placement of honeypots for network defense
Cites Work
- Robust optimization
- Quantal response equilibria for normal form games
- Prospect Theory: An Analysis of Decision under Risk
- The Linear Programming Approach to Approximate Dynamic Programming
- Constraint-based optimization and utility elicitation using the minimax decision criterion
- Security and Game Theory
- Improving resource allocation strategies against human adversaries in security games: an extended study
- Decision and game theory for security. First international conference, GameSec 2010, Berlin, Germany, November 22--23, 2010. Proceedings
- Sequential Stackelberg equilibria in two-person games
- Approximation methods for infinite Bayesian Stackelberg games: Modeling distributional payoff uncertainty
Cited In (5)
- No Time to Lie: Bounds on the Learning Rate of a Defender for Inferring Attacker Target Preferences
- Learning Generative Deception Strategies in Combinatorial Masking Games
- Risk-Distortion Analysis for Video Collusion Attacks: A Mouse-and-Cat Game
- Interdicting Attack Plans with Boundedly Rational Players and Multiple Attackers: An Adversarial Risk Analysis Approach
- Casino rationale: countering attacker deception in zero-sum Stackelberg security games of bounded rationality
This page was built for publication: Exploiting bounded rationality in risk-based cyber camouflage games
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2056937)