A generalized approach to solve perfect Bayesian Nash equilibrium for practical network attack and defense
暂无分享,去创建一个
Jiayong Liu | Shan Liao | Lei Zhang | Liang Liu | Zhenxue Wang | Lei Zhang | Zhenxue Wang | Jiayong Liu | Liang Liu | Shan Liao
[1] Christoph Schottmüller,et al. Regime change games with an active defender , 2021, Games Econ. Behav..
[2] Yunyun Niu,et al. Strategy evolution of panic pedestrians in emergent evacuation with assailants based on susceptible-infected-susceptible model , 2021, Inf. Sci..
[3] Wei Yin,et al. Quantitative cyber-physical security analysis methodology for industrial control systems based on incomplete information Bayesian game , 2021, Comput. Secur..
[4] Wen Yang,et al. Detection against randomly occurring complex attacks on distributed state estimation , 2021, Inf. Sci..
[5] Cheng-Kuang Wu. A Game Theory Approach for Risk Analysis and Security Force Deployment Against Multiple Coordinated Attacks. , 2021, Environmental research.
[6] Xianpei Wang,et al. Analysis of false data injection attacks in power systems: A dynamic Bayesian game-theoretic approach. , 2021, ISA transactions.
[7] Jianan Wang,et al. Particle filtering for a class of cyber-physical systems under Round-Robin protocol subject to randomly occurring deception attacks , 2021, Inf. Sci..
[8] Brij B. Gupta,et al. A reputation score policy and Bayesian game theory based incentivized mechanism for DDoS attacks mitigation and cyber defense , 2020, Future Gener. Comput. Syst..
[9] Mohamed Ould-Khaoua,et al. Game-theoretic modeling of the behavior of Domain Name System attacker , 2020, Comput. Electr. Eng..
[10] Chunming Zhang,et al. A differential game method against attacks in heterogeneous honeynet , 2020, Comput. Secur..
[11] Jinyin Chen,et al. MAG-GAN: Massive attack generator via GAN , 2020, Inf. Sci..
[12] Xiuchun Xiao,et al. RNN for Solving Time-Variant Generalized Sylvester Equation With Applications to Robots and Acoustic Source Localization , 2020, IEEE Transactions on Industrial Informatics.
[13] Ya Li,et al. Adversarial attacks on deep-learning-based radar range profile target recognition , 2020, Inf. Sci..
[14] Yanjiao Chen,et al. Event evolution model for cybersecurity event mining in tweet streams , 2020, Inf. Sci..
[15] Lianhai Wang,et al. Incentive mechanism for cooperative authentication: An evolutionary game approach , 2020, Inf. Sci..
[16] Tangi Migot,et al. A parametrized variational inequality approach to track the solution set of a generalized nash equilibrium problem , 2020, Eur. J. Oper. Res..
[17] Yuhu Wu,et al. A congestion game framework for service chain composition in NFV with function benefit , 2020, Inf. Sci..
[18] Long Cheng,et al. RNN for Perturbed Manipulability Optimization of Manipulators Based on a Distributed Scheme: A Game-Theoretic Perspective , 2020, IEEE Transactions on Neural Networks and Learning Systems.
[19] Anju Sharma,et al. GTM-CSec: Game theoretic model for cloud security based on IDS and honeypot , 2020, Comput. Secur..
[20] Mark Harman,et al. Game-theoretic analysis of development practices: Challenges and opportunities , 2020, J. Syst. Softw..
[21] Quanyan Zhu,et al. A Dynamic Games Approach to Proactive Defense Strategies against Advanced Persistent Threats in Cyber-Physical Systems , 2019, Comput. Secur..
[22] Yan Zhang,et al. Game theoretic approach to shadowed sets: A three-way tradeoff perspective , 2020, Inf. Sci..
[23] Chong-Xiao Shi,et al. Nash equilibrium computation in two-network zero-sum games: An incremental algorithm , 2019, Neurocomputing.
[24] Fengyin Li,et al. A game-theoretic method based on Q-learning to invalidate criminal smart contracts , 2019, Inf. Sci..
[25] Jie Cao,et al. Link prediction in temporal networks: Integrating survival analysis and game theory , 2019, Inf. Sci..
[26] Guang-Hong Yang,et al. Distributed Nash equilibrium computation in aggregative games: An event-triggered algorithm , 2019, Inf. Sci..
[27] Lu Zhou,et al. Game theoretic security of quantum bit commitment , 2019, Inf. Sci..
[28] Hongke Zhang,et al. Smart collaborative distribution for privacy enhancement in moving target defense , 2019, Inf. Sci..
[29] Hamido Fujita,et al. Updating three-way decisions in incomplete multi-scale information systems , 2019, Inf. Sci..
[30] Wenjing Jia,et al. Intrusion detection model of wireless sensor networks based on game theory and an autoregressive model , 2019, Inf. Sci..
[31] Tinglong Dai,et al. Game Theory and Information Economics , 2018, Handbook of Healthcare Analytics.
[32] Wei Wang,et al. Game theoretical security detection strategy for networked systems , 2018, Inf. Sci..
[33] Reinhard Selten. Spieltheoretische Behandlung eines Oligopolmodells mit Nachfrageträgheit , 2016 .
[34] Brian P. Van Leeuwen,et al. Operational cost of deploying Moving Target Defenses defensive work factors , 2015, MILCOM 2015 - 2015 IEEE Military Communications Conference.
[35] Akio Matsumoto,et al. Game Theory and Its Applications , 2015 .
[36] Tansu Alpcan,et al. Network Security , 2010 .
[37] Wei Jiang,et al. Evaluating Network Security and Optimal Active Defense Based on Attack-Defense Game Model: Evaluating Network Security and Optimal Active Defense Based on Attack-Defense Game Model , 2009 .
[38] Jiang Wei. Evaluating Network Security and Optimal Active Defense Based on Attack-Defense Game Model , 2009 .
[39] J. Nash. NON-COOPERATIVE GAMES , 1951, Classics in Game Theory.