Sciweavers

14 search results - page 2 / 3
» Game Theory with Learning for Cyber Security Monitoring
Sort
View
COLT
2003
Springer
13 years 10 months ago
On-Line Learning with Imperfect Monitoring
We study on-line play of repeated matrix games in which the observations of past actions of the other player and the obtained reward are partial and stochastic. We define the Part...
Shie Mannor, Nahum Shimkin
CCS
2006
ACM
13 years 9 months ago
Can machine learning be secure?
Machine learning systems offer unparalled flexibility in dealing with evolving input in a variety of applications, such as intrusion detection systems and spam e-mail filtering. H...
Marco Barreno, Blaine Nelson, Russell Sears, Antho...
ATAL
2009
Springer
14 years 3 days ago
Learning equilibria in repeated congestion games
While the class of congestion games has been thoroughly studied in the multi-agent systems literature, settings with incomplete information have received relatively little attenti...
Moshe Tennenholtz, Aviv Zohar
INFOCOM
2012
IEEE
11 years 8 months ago
Di-Sec: A distributed security framework for heterogeneous Wireless Sensor Networks
Wireless Sensor Networks (WSNs) are no longer a nascent technology and today, they are actively deployed as a viable technology in many diverse application domains such as health ...
Marco Valero, Sang Shin Jung, A. Selcuk Uluagac, Y...
PODC
2004
ACM
13 years 11 months ago
Completely fair SFE and coalition-safe cheap talk
Secure function evaluation (SFE) enables a group of players, by themselves, to evaluate a function on private inputs as securely as if a trusted third party had done it for them. ...
Matt Lepinski, Silvio Micali, Chris Peikert, Abhi ...