Exploiting bounded rationality in risk-based cyber camouflage games
From MaRDI portal
(Redirected from Publication:2056937)
Recommendations
- You only lie twice: a multi-round cyber deception game of questionable veracity
- Learning Generative Deception Strategies in Combinatorial Masking Games
- Game theory on attack graph for cyber deception
- Harnessing the power of deception in attack graph-based security games
- Optimal placement of honeypots for network defense
Cites work
- Approximation methods for infinite Bayesian Stackelberg games: Modeling distributional payoff uncertainty
- Constraint-based optimization and utility elicitation using the minimax decision criterion
- Decision and game theory for security. First international conference, GameSec 2010, Berlin, Germany, November 22--23, 2010. Proceedings
- Improving resource allocation strategies against human adversaries in security games: an extended study
- Prospect Theory: An Analysis of Decision under Risk
- Quantal response equilibria for normal form games
- Robust optimization
- Security and Game Theory
- Sequential Stackelberg equilibria in two-person games
- The Linear Programming Approach to Approximate Dynamic Programming
Cited in
(5)- Casino rationale: countering attacker deception in zero-sum Stackelberg security games of bounded rationality
- No Time to Lie: Bounds on the Learning Rate of a Defender for Inferring Attacker Target Preferences
- Learning Generative Deception Strategies in Combinatorial Masking Games
- Risk-Distortion Analysis for Video Collusion Attacks: A Mouse-and-Cat Game
- Interdicting Attack Plans with Boundedly Rational Players and Multiple Attackers: An Adversarial Risk Analysis Approach
This page was built for publication: Exploiting bounded rationality in risk-based cyber camouflage games
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2056937)