Influence blocking maximization on networks: Models, methods and applications
Due to the continuous emergence of various social and trade networks, network influence
analysis has aroused great interest of the researchers. Based on different influence …
analysis has aroused great interest of the researchers. Based on different influence …
Stackelberg security games: Looking beyond a decade of success
Abstract The Stackelberg Security Game (SSG) model has been immensely influential in
security research since it was introduced roughly a decade ago. Furthermore, deployed SSG …
security research since it was introduced roughly a decade ago. Furthermore, deployed SSG …
From physical security to cybersecurity
Security is a critical concern around the world. In many domains from cybersecurity to
sustainability, limited security resources prevent complete security coverage at all times …
sustainability, limited security resources prevent complete security coverage at all times …
Artificial intelligence for social good: A survey
Game theoretic approaches to attack surface shifting
PK Manadhata - Moving target defense II: Application of game theory …, 2012 - Springer
A software system's attack surface is the set of ways in which the system can be attacked. In
our prior work, we introduced an attack surface measurement and reduction method to …
our prior work, we introduced an attack surface measurement and reduction method to …
Game-theoretic foundations for the strategic use of honeypots in network security
An important element in the mathematical and scientific foundations for security is modeling
the strategic use of deception and information manipulation. We argue that game theory …
the strategic use of deception and information manipulation. We argue that game theory …