Sciweavers

9 search results - page 1 / 2
» gamesec 2010
Sort
View
GAMESEC
2010
117views Game Theory» more  GAMESEC 2010»
13 years 3 months ago
Attack-Defense Trees and Two-Player Binary Zero-Sum Extensive Form Games Are Equivalent
Attack
Barbara Kordy, Sjouke Mauw, Matthijs Melissen, Pat...
GAMESEC
2010
139views Game Theory» more  GAMESEC 2010»
13 years 3 months ago
Design of Network Topology in an Adversarial Environment
We study the strategic interaction between a network manager whose goal is to choose (as communication infrastructure) a spanning tree of a network given as an undirected graph, an...
Assane Gueye, Jean C. Walrand, Venkat Anantharam
GAMESEC
2010
119views Game Theory» more  GAMESEC 2010»
13 years 3 months ago
Uncertainty in Interdependent Security Games
Abstract. Even the most well-motivated models of information security have application limitations due to the inherent uncertainties involving risk. This paper exemplifies a formal...
Benjamin Johnson, Jens Grossklags, Nicolas Christi...
GAMESEC
2010
136views Game Theory» more  GAMESEC 2010»
13 years 3 months ago
Effective Multimodel Anomaly Detection Using Cooperative Negotiation
Abstract. Many computer protection tools incorporate learning techniques that build mathematical models to capture the characteristics of system's activity and then check whet...
Alberto Volpatto, Federico Maggi, Stefano Zanero