標(biāo)題: Titlebook: Decision and Game Theory for Security; 7th International Co Quanyan Zhu,Tansu Alpcan,William Casey Conference proceedings 2016 Springer Int [打印本頁] 作者: coerce 時(shí)間: 2025-3-21 16:22
書目名稱Decision and Game Theory for Security影響因子(影響力)
書目名稱Decision and Game Theory for Security影響因子(影響力)學(xué)科排名
書目名稱Decision and Game Theory for Security網(wǎng)絡(luò)公開度
書目名稱Decision and Game Theory for Security網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Decision and Game Theory for Security被引頻次
書目名稱Decision and Game Theory for Security被引頻次學(xué)科排名
書目名稱Decision and Game Theory for Security年度引用
書目名稱Decision and Game Theory for Security年度引用學(xué)科排名
書目名稱Decision and Game Theory for Security讀者反饋
書目名稱Decision and Game Theory for Security讀者反饋學(xué)科排名
作者: 填料 時(shí)間: 2025-3-21 20:23 作者: 使增至最大 時(shí)間: 2025-3-22 03:04 作者: PATHY 時(shí)間: 2025-3-22 07:42 作者: 倔強(qiáng)一點(diǎn) 時(shí)間: 2025-3-22 11:44 作者: 松緊帶 時(shí)間: 2025-3-22 14:06
T. Kuhn,A. Wegorzewski,C. Rühlemann,A. Vinklgorithms used in [.] by reducing the number of integer variables, outlining how this adapts to arbitrary linear constraints. Computational results are presented on large scale artificial instances, showing the qualitative advantages of using a risk measure rather than the expected value.作者: 松緊帶 時(shí)間: 2025-3-22 18:19
https://doi.org/10.1007/978-3-319-52557-0iple defenders. We apply our proposed framework in two case studies on interdependent SCADA networks and distributed energy resources, respectively. In particular, we investigate the efficiency loss due to decentralized defense allocations.作者: 我不怕犧牲 時(shí)間: 2025-3-22 23:25
0302-9743 eory for Security, GameSec 2016, held in New York, NY, USA, in November 2016...The 18 revised full papers presented together with 8 short papers and 5 poster papers were carefully reviewed and selected from 40 submissions. The papers are organized in topical sections on network security; security ri作者: BIAS 時(shí)間: 2025-3-23 04:04 作者: chastise 時(shí)間: 2025-3-23 09:04 作者: 注意 時(shí)間: 2025-3-23 09:45 作者: absolve 時(shí)間: 2025-3-23 15:24 作者: CHYME 時(shí)間: 2025-3-23 21:17 作者: 夜晚 時(shí)間: 2025-3-24 00:17
Scalar Quadratic-Gaussian Soft Watermarking Gameshe attacker. We show that for linear encoder, the optimal attacker is Gaussian-affine, derive the optimal system parameters in that case, and discuss the corresponding system behavior. We also provide numerical results to gain further insight and understanding of the system behavior at optimality.作者: 終端 時(shí)間: 2025-3-24 06:07
SETI and the FOCAL space missionrested in the min max strategy as it guarantees the best performance under worst possible link capacity degradation. It thus allows to obtain routing strategies that are resilient and robust. We compare the results of the min-max to those obtained under the max-min strategies. We provide stable algo作者: interference 時(shí)間: 2025-3-24 07:28 作者: Pigeon 時(shí)間: 2025-3-24 11:22 作者: 積習(xí)已深 時(shí)間: 2025-3-24 16:55
Hermann Kudrass,Ray Wood,Robin Falconerracteristics among others, thus characterizing them as normal or intruder tags. An interference mitigation risk aware (IMRA) problem is introduced aiming at maximizing each tag’s utility function, thus implicitly enforcing tags to conform to a more social behavior. Due to its nature, the proposed pr作者: 莊嚴(yán) 時(shí)間: 2025-3-24 19:37 作者: deface 時(shí)間: 2025-3-25 01:08 作者: Interdict 時(shí)間: 2025-3-25 05:01 作者: Abduct 時(shí)間: 2025-3-25 07:56 作者: 無能的人 時(shí)間: 2025-3-25 13:40 作者: foodstuff 時(shí)間: 2025-3-25 18:15
Deception-Based Game Theoretical Approach to Mitigate DoS Attacksts into the balance between resource and investment, and also shows that defenders can achieve high level of security against DoS attacks with cost-effective solutions through the proposed deception strategy.作者: Fluctuate 時(shí)間: 2025-3-25 20:19 作者: BARGE 時(shí)間: 2025-3-26 01:32
On the Mitigation of Interference Imposed by Intruders in Passive RFID Networksracteristics among others, thus characterizing them as normal or intruder tags. An interference mitigation risk aware (IMRA) problem is introduced aiming at maximizing each tag’s utility function, thus implicitly enforcing tags to conform to a more social behavior. Due to its nature, the proposed pr作者: 駭人 時(shí)間: 2025-3-26 06:21
Optimal Allocation of Police Patrol Resources Using a Continuous-Time Crime Modelta for Nashville, TN. We demonstrate that our model is more accurate, and much faster, than state-of-the-art alternatives. Using this model in the bi-level optimization framework, we demonstrate that our decision theoretic approach outperforms alternatives, including actual police patrol policies.作者: 僵硬 時(shí)間: 2025-3-26 08:43 作者: 有花 時(shí)間: 2025-3-26 12:53 作者: 秘密會(huì)議 時(shí)間: 2025-3-26 20:22
Strategies for Voter-Initiated Election Audits that when the constructing device has prior knowledge of how a voter might vote, it critically undermines the effectiveness of the auditing. This is particularly relevant to internet voting systems, some of which also rely on Benaloh Challenges for their auditing step..A parallel version, in which 作者: 排他 時(shí)間: 2025-3-26 23:56 作者: 商店街 時(shí)間: 2025-3-27 03:20 作者: glans-penis 時(shí)間: 2025-3-27 07:41
Lecture Notes in Computer Sciencehttp://image.papertrans.cn/d/image/264325.jpg作者: 事與愿違 時(shí)間: 2025-3-27 09:45 作者: Aprope 時(shí)間: 2025-3-27 17:18 作者: 特征 時(shí)間: 2025-3-27 18:09
Decision and Game Theory for Security978-3-319-47413-7Series ISSN 0302-9743 Series E-ISSN 1611-3349 作者: 延期 時(shí)間: 2025-3-28 00:12 作者: 盟軍 時(shí)間: 2025-3-28 06:03 作者: 很像弓] 時(shí)間: 2025-3-28 07:21
Hydrothermal PMS and Related Depositsn mechanisms, DoS attacks continue to exist, and there is no widely-accepted solution. We propose a deception-based protection mechanism that involves game theory to model the interaction between the defender and the attacker. The defender’s challenge is to determine the optimal network configuratio作者: 投票 時(shí)間: 2025-3-28 13:43
Hydrothermal PMS and Related Deposits of detecting data exfiltration over Domain Name System (DNS) queries, where existing detection sensors are imperfect and lead to noisy observations about the network’s security state. Data exfiltration over DNS queries involves unauthorized transfer of sensitive data from an organization to a remot作者: Mere僅僅 時(shí)間: 2025-3-28 18:11
Hermann Kudrass,Ray Wood,Robin Falconerow cost energy-efficient alternatives that find applicability in a wide range of applications. However, such RFID networks and devices, due to their limited capabilities, can easily become vulnerable to several intrusive actions. In this paper, the problem of proactively protecting a passive RFID ne作者: 蒼白 時(shí)間: 2025-3-28 22:24
T. Kuhn,A. Wegorzewski,C. Rühlemann,A. Vinkhat uses a quantal response (QR) to decide which target to attack. The main contribution consists in introducing risk aversion in the defender’s behavior by using an entropic risk measure. Our work extends the work in [.] to a model that considers a risk averse defender. In addition we improve the a作者: DAMP 時(shí)間: 2025-3-29 01:11
https://doi.org/10.1007/978-3-319-52557-0the security of multiple assets, with the interdependencies between the assets captured by an .. We formulate the problem of computing the optimal defense allocation by a single defender as a convex optimization problem, and establish the existence of a pure Nash equilibrium of the game between mult作者: galley 時(shí)間: 2025-3-29 06:28
The Patrick Moore Practical Astronomy Seriesrity. Prior work on linear influence networks targeting those risk management applications have been focused on equilibrium analysis in a static, one-shot setting. Furthermore, the underlying network environment is also assumed to be deterministic..In this paper, we lift those two assumptions and co作者: 立即 時(shí)間: 2025-3-29 09:46 作者: 微生物 時(shí)間: 2025-3-29 15:23 作者: babble 時(shí)間: 2025-3-29 17:31
Deep-Time Images in the Age of Globalization previous work, we proposed an analytical model for identifying and hardening the most critical communication equipment used in the power system. Using non-cooperative game theory, we modeled the interactions between an attacker and a defender and derived the minimum defense resources required and t作者: Buttress 時(shí)間: 2025-3-29 21:08
Rogélia Martins,Carlos Ferreiraexploring aspects of the economics of the adoption of privacy-enhancing technologies. In order to formulate a model of decision-making among choices of technologies by these agents, we consider the following: ., the setting in which and the purpose for which a given technology is used; ., the level 作者: PRE 時(shí)間: 2025-3-30 02:30 作者: 膽汁 時(shí)間: 2025-3-30 07:10
Nicole Saylor,Patrick Gruber,Michelle Nix an estimate of the embedded watermark to minimize the expected estimation error (unlike the conventional watermarking schemes where both the hidden information and the receiver output are from a discrete finite set). Applications include embedding a multimedia content into another. We study here th作者: 使虛弱 時(shí)間: 2025-3-30 09:10 作者: 嘴唇可修剪 時(shí)間: 2025-3-30 14:14 作者: leniency 時(shí)間: 2025-3-30 17:46
Deception-Based Game Theoretical Approach to Mitigate DoS Attacksn mechanisms, DoS attacks continue to exist, and there is no widely-accepted solution. We propose a deception-based protection mechanism that involves game theory to model the interaction between the defender and the attacker. The defender’s challenge is to determine the optimal network configuratio