Security and Game Theory
From MaRDI portal
Publication:3225470
DOI10.1017/CBO9780511973031zbMath1235.91005OpenAlexW4253730333MaRDI QIDQ3225470
Publication date: 21 March 2012
Full work available at URL: https://doi.org/10.1017/cbo9780511973031
Applications of game theory (91A80) Collections of articles of miscellaneous specific interest (00B15) Proceedings, conferences, collections, etc. pertaining to game theory, economics, and finance (91-06) Other game-theoretic models (91A40)
Related Items
Dynamic contract design for systemic cyber risk management of interdependent enterprise networks ⋮ Tree-Based Structural Twin Support Tensor Clustering with Square Loss Function ⋮ Game-Theoretic Resource Allocation with Real-Time Probabilistic Surveillance Information ⋮ Optimal and Game-Theoretic Deployment of Security Investments in Interdependent Assets ⋮ Network design and defence ⋮ Computation of Stackelberg Equilibria of Finite Sequential Games ⋮ Comparing human behavior models in repeated Stackelberg security games: an extended study ⋮ Optimal defense against election control by deleting voter groups ⋮ A continuous-time Markov Stackelberg security game approach for reasoning about real patrol strategies ⋮ Solving Defender-Attacker Game with Multiple Decision Makers Using Expected-Value Model ⋮ A sequential Stackelberg game for dynamic inspection problems ⋮ Modeling bluffing behavior in signaling security games ⋮ Decomposition of probability marginals for security games in abstract networks ⋮ A game-theoretical approach for policing decision support ⋮ Games over probability distributions revisited: new equilibrium models and refinements ⋮ A complete analysis on the risk of using quantal response: when attacker maliciously changes behavior under uncertainty ⋮ A survey on mixed-integer programming techniques in bilevel optimization ⋮ Hitting a path: a generalization of weighted connectivity via game theory ⋮ Multilinear Games ⋮ The risk of attacker behavioral learning: can attacker fool defender under uncertainty? ⋮ Casino rationale: countering attacker deception in zero-sum Stackelberg security games of bounded rationality ⋮ Randomized strategies for robust combinatorial optimization with approximate separation ⋮ Deception in multi-attacker security game with nonfuzzy and fuzzy payoffs ⋮ Guessing the game: an individual's awareness and assessment of a game's existence ⋮ Game Theory and Cyber Defense ⋮ A robust optimization approach to enhancing reliability in production planning under non-compliance risks ⋮ Tackling Sequential Attacks in Security Games ⋮ Using the extraproximal method for computing the shortest-path mixed Lyapunov equilibrium in Stackelberg security games ⋮ A Monte Carlo tree search approach to finding efficient patrolling schemes on graphs ⋮ Adversarial classification using signaling games with an application to phishing detection ⋮ Optimal design and defense of networks under link attacks ⋮ Security games on matroids ⋮ An interdiction game on a queueing network with multiple intruders ⋮ A polynomial-time method to compute all Nash equilibria solutions of a general two-person inspection game ⋮ Keeping pace with criminals: an extended study of designing patrol allocation against adaptive opportunistic criminals ⋮ Recursively modeling other agents for decision making: a research perspective ⋮ Leadership in singleton congestion games: what is hard and what is easy ⋮ Gradient methods for solving Stackelberg games ⋮ Engineering secure self-adaptive systems with Bayesian games ⋮ Computing mixed strategies equilibria in presence of switching costs by the solution of nonconvex QP problems ⋮ Negotiating team formation using deep reinforcement learning ⋮ Protecting elections by recounting ballots ⋮ Allocating limited resources to protect a massive number of targets using a game theoretic model ⋮ A repeated imitation model with dependence between stages: decision strategies and rewards ⋮ Exploiting bounded rationality in risk-based cyber camouflage games ⋮ Harnessing the power of deception in attack graph-based security games ⋮ Normalizing flow policies for multi-agent systems ⋮ Using one-sided partially observable stochastic games for solving zero-sum security games with sequential attacks ⋮ Non-equilibrium dynamic games and cyber-physical security: a cognitive hierarchy approach ⋮ Economically Optimal Variable Tag Length Message Authentication ⋮ A Unified Framework for Multistage Mixed Integer Linear Optimization ⋮ How Do You Defend a Network? ⋮ Optimally Deceiving a Learning Leader in Stackelberg Games ⋮ Static search games played over graphs and general metric spaces