Influence blocking maximization on networks: Models, methods and applications

BL Chen, WX Jiang, YX Chen, L Chen, RJ Wang… - Physics Reports, 2022 - Elsevier
Due to the continuous emergence of various social and trade networks, network influence
analysis has aroused great interest of the researchers. Based on different influence …

Stackelberg security games: Looking beyond a decade of success

A Sinha, F Fang, B An, C Kiekintveld, M Tambe - 2018 - ink.library.smu.edu.sg
Abstract The Stackelberg Security Game (SSG) model has been immensely influential in
security research since it was introduced roughly a decade ago. Furthermore, deployed SSG …

From physical security to cybersecurity

A Sinha, TH Nguyen, D Kar, M Brown… - Journal of …, 2015 - academic.oup.com
Security is a critical concern around the world. In many domains from cybersecurity to
sustainability, limited security resources prevent complete security coverage at all times …

Artificial intelligence for social good: A survey

ZR Shi, C Wang, F Fang - ar** scalable solution algorithms is one of the central problems in computational
game theory. We present an iterative algorithm for computing an exact Nash equilibrium for …

Game theoretic approaches to attack surface shifting

PK Manadhata - Moving target defense II: Application of game theory …, 2012 - Springer
A software system's attack surface is the set of ways in which the system can be attacked. In
our prior work, we introduced an attack surface measurement and reduction method to …

Game-theoretic foundations for the strategic use of honeypots in network security

C Kiekintveld, V Lisý, R Píbil - Cyber Warfare: Building the Scientific …, 2015 - Springer
An important element in the mathematical and scientific foundations for security is modeling
the strategic use of deception and information manipulation. We argue that game theory …