Decision and Game Theory for Security: 11th International Conference, GameSec 2020, College Park, MD, USA, October 28–30, 2020, Proceedings
暂无分享,去创建一个
[1] Jie Fu,et al. A Compositional Approach to Reactive Games under Temporal Logic Specifications , 2018, 2018 Annual American Control Conference (ACC).
[2] Manish Jain,et al. Computing optimal randomized resource allocations for massive security games , 2009, AAMAS.
[3] Christel Baier,et al. Principles of model checking , 2008 .
[4] Eero P. Simoncelli,et al. Image quality assessment: from error visibility to structural similarity , 2004, IEEE Transactions on Image Processing.
[5] Wenruo Bai,et al. Greed is Still Good: Maximizing Monotone Submodular+Supermodular Functions , 2018, ICML.
[6] Kyoichi Kijima,et al. Hierarchical hypergames and Bayesian games: A generalization of the theoretical comparison of hypergames and Bayesian games considering hierarchy of perceptions , 2016, J. Syst. Sci. Complex..
[7] Vijay V. Vazirani,et al. Approximation Algorithms , 2001, Springer Berlin Heidelberg.
[8] Xinming Ou,et al. A scalable approach to attack graph generation , 2006, CCS '06.
[9] Roshan K. Thomas,et al. Bridging the Classical D&D and Cyber Security Domains , 2015 .
[10] Branislav Bosanský,et al. Optimal Network Security Hardening Using Attack Graph Games , 2015, IJCAI.
[11] Krishnendu Chatterjee,et al. Graph Games and Reactive Synthesis , 2018, Handbook of Model Checking.
[12] Viliam Lisý,et al. Game-Theoretic Foundations for the Strategic Use of Honeypots in Network Security , 2015, Cyber Warfare.
[13] Somesh Jha,et al. Two formal analyses of attack graphs , 2002, Proceedings 15th IEEE Computer Security Foundations Workshop. CSFW-15.
[14] Alan C. Bovik,et al. Mean squared error: Love it or leave it? A new look at Signal Fidelity Measures , 2009, IEEE Signal Processing Magazine.
[15] Weisi Lin,et al. Just-noticeable difference estimation with pixels in images , 2008, J. Vis. Commun. Image Represent..
[16] Haifeng Xu,et al. Cyber Camouflage Games for Strategic Deception , 2019, GameSec.
[17] Charles A. Kamhoua,et al. Deceptive Labeling: Hypergames on Graphs for Stealthy Deception , 2021, IEEE Control Systems Letters.
[18] Pan He,et al. Adversarial Examples: Attacks and Defenses for Deep Learning , 2017, IEEE Transactions on Neural Networks and Learning Systems.
[19] Bo An,et al. Stackelberg Security Games: Looking Beyond a Decade of Success , 2018, IJCAI.
[20] Branislav Bosanský,et al. Game Theoretic Model of Strategic Honeypot Selection in Computer Networks , 2012, GameSec.
[21] Jean-François Raskin,et al. Antichains and compositional algorithms for LTL synthesis , 2011, Formal Methods Syst. Des..
[22] U. Neisser. VISUAL SEARCH. , 1964, Scientific American.
[23] Zohar Manna,et al. The Temporal Logic of Reactive and Concurrent Systems , 1991, Springer New York.
[24] Thomas A. Henzinger,et al. Concurrent reachability games , 2007, Theor. Comput. Sci..
[25] Charles Kamhoua,et al. Honeypot Allocation over Attack Graphs in Cyber Deception Games , 2020, 2020 International Conference on Computing, Networking and Communications (ICNC).
[26] René Mazala,et al. Infinite Games , 2001, Automata, Logics, and Infinite Games.
[27] Robert McNaughton,et al. Infinite Games Played on Finite Graphs , 1993, Ann. Pure Appl. Logic.
[28] Peter Bennett,et al. Hypergame Theory and Methodology: the Current “State of the Art” , 1986 .
[29] Wei Jiang,et al. Optimal Network Security Strengthening Using Attack-Defense Game Model , 2009, 2009 Sixth International Conference on Information Technology: New Generations.
[30] Flemming Nielson,et al. Quantitative Verification and Synthesis of Attack-Defence Scenarios , 2016, 2016 IEEE 29th Computer Security Foundations Symposium (CSF).