Dynamic games in cyber-physical security: An overview
Due to complex dependencies between multiple layers and components of emerging cyber-
physical systems, security and vulnerability of such systems have become a major challenge …
physical systems, security and vulnerability of such systems have become a major challenge …
Deploying paws: Field optimization of the protection assistant for wildlife security
Poaching is a serious threat to the conservation of key species and whole ecosystems.
While conducting foot patrols is the most commonly used approach in many countries to …
While conducting foot patrols is the most commonly used approach in many countries to …
PAWS—A deployed game-theoretic application to combat poaching
Poaching is considered a major driver for the population drop of key species such as tigers,
elephants, and rhinos, which can be detrimental to whole ecosystems. While conducting foot …
elephants, and rhinos, which can be detrimental to whole ecosystems. While conducting foot …
Stackelberg security games (ssg) basics and application overview
Security is a critical concern around the world that arises in protecting our ports, airports,
transportation or other critical national infrastructure, curtailing the illegal flow of drugs …
transportation or other critical national infrastructure, curtailing the illegal flow of drugs …
Imitative follower deception in stackelberg games
Information uncertainty is one of the major challenges facing applications of game theory. In
the context of Stackelberg games, various approaches have been proposed to deal with the …
the context of Stackelberg games, various approaches have been proposed to deal with the …
Coevolutionary Algorithm for Building Robust Decision Trees under Minimax Regret
In recent years, there has been growing interest in develo** robust machine learning (ML)
models that can withstand adversarial attacks, including one of the most widely adopted …
models that can withstand adversarial attacks, including one of the most widely adopted …
Cyber camouflage games for strategic deception
The rapid increase in cybercrime, causing a reported annual economic loss of $600 billion
(Lewis 2018), has prompted a critical need for effective cyber defense. Strategic criminals …
(Lewis 2018), has prompted a critical need for effective cyber defense. Strategic criminals …
Robust Stackelberg equilibria in extensive-form games and extension to limited lookahead
Stackelberg equilibria have become increasingly important as a solution concept in
computational game theory, largely inspired by practical problems such as security settings …
computational game theory, largely inspired by practical problems such as security settings …
Making the most of our regrets: Regret-based solutions to handle payoff uncertainty and elicitation in green security games
TH Nguyen, FMD Fave, D Kar… - Decision and Game …, 2015 - Springer
Abstract Recent research on Green Security Games (GSG), ie, security games for the
protection of wildlife, forest and fisheries, relies on the promise of an abundance of available …
protection of wildlife, forest and fisheries, relies on the promise of an abundance of available …
Workload factoring and resource sharing via joint vertical and horizontal cloud federation networks
In cloud computing, a private (secondary) cloud can: 1) outsource workload to public
(primary) clouds via vertical federation or 2) share resources with other secondary clouds …
(primary) clouds via vertical federation or 2) share resources with other secondary clouds …