×

Found 45 Documents (Results 1–45)

Learning generative deception strategies in combinatorial masking games. (English) Zbl 1509.68029

Bošanský, Branislav (ed.) et al., Decision and game theory for security. 12th international conference, GameSec 2021, virtual event, October 25–27, 2021. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13061, 98-117 (2021).
MSC:  68M25 68T05 91A80

Scalable algorithms for identifying stealthy attackers in a game-theoretic framework using deception. (English) Zbl 07526397

Kamhoua, Charles A. (ed.) et al., Game theory and machine learning for cyber security. Piscataway, NJ: IEEE Press; Hoboken, NJ: John Wiley & Sons. 47-61 (2021).
MSC:  68M25 68T05 91A80
Full Text: DOI

Decoy allocation games on graphs with temporal logic objectives. (English) Zbl 1483.68044

Zhu, Quanyan (ed.) et al., Decision and game theory for security. 11th international conference, GameSec 2020, College Park, MD, USA, October 28–30, 2020. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12513, 168-187 (2020).

Harnessing the power of deception in attack graph-based security games. (English) Zbl 1483.68046

Zhu, Quanyan (ed.) et al., Decision and game theory for security. 11th international conference, GameSec 2020, College Park, MD, USA, October 28–30, 2020. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12513, 147-167 (2020).
MSC:  68M25 91A43 91A80
Full Text: DOI

Exploiting bounded rationality in risk-based cyber camouflage games. (English) Zbl 1483.68049

Zhu, Quanyan (ed.) et al., Decision and game theory for security. 11th international conference, GameSec 2020, College Park, MD, USA, October 28–30, 2020. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12513, 103-124 (2020).
MSC:  68M25 91A80
Full Text: DOI

You only lie twice: a multi-round cyber deception game of questionable veracity. (English) Zbl 1446.91020

Alpcan, Tansu (ed.) et al., Decision and game theory for security. 10th international conference, GameSec 2019, Stockholm, Sweden, October 30 – November 1, 2019. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11836, 65-84 (2019).
Full Text: DOI

A game-theoretic analysis of deception over social networks using fake avatars. (English) Zbl 1453.91035

Zhu, Quanyan (ed.) et al., Decision and game theory for security. 7th international conference, GameSec 2016, New York, NY, USA, November 2–4, 2016. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 9996, 382-394 (2016).
MSC:  91A43 91A28 91D30
Full Text: DOI

Deception-based game theoretical approach to mitigate DoS attacks. (English) Zbl 1448.68188

Zhu, Quanyan (ed.) et al., Decision and game theory for security. 7th international conference, GameSec 2016, New York, NY, USA, November 2–4, 2016. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 9996, 18-38 (2016).
Full Text: DOI

Game theoretic model of strategic honeypot selection in computer networks. (English) Zbl 1377.68025

Grossklags, Jens (ed.) et al., Decision and game theory for security. Third international conference, GameSec 2012, Budapest, Hungary, November 5–6, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-34265-3/pbk). Lecture Notes in Computer Science 7638, 201-220 (2012).
MSC:  68M10 91A40 91A80
Full Text: DOI

Filter Results by …

Document Type

all top 5

Author

all top 5

Year of Publication

all top 3

Main Field

all top 3

Software