Nothing Special   »   [go: up one dir, main page]

×
Please click here if you are not redirected within a few seconds.
Oct 31, 2021 · In this work, we investigate the defender's counteraction against attacker deception in a Stackelberg security game setting.
Defending against attackers with unknown behavior is an important area of research in security games. A well-established approach is to utilize his- torical ...
Defending against attackers with unknown behav- ior is an important area of research in security games. A well-established approach is to utilize historical ...
In this paper, we investigate how a wary defender can defend against such deceptive attacker. We provide four main contributions.
We provide four main contributions. First, we develop a new technique to estimate attacker true behavior despite data manipulation by the clever adversary.
We provide four main contributions. First, we develop a new technique to estimate attacker true behavior despite data manipulation by the clever adversary.
In this paper, we investigate how a wary defender can defend against such deceptive attacker. We provide four main contributions. First, we develop a new ...
Albarran, S.E., Clempner, J.B.: A Stackelberg security Markov game based on partial information for strategic decision making against unexpected attacks. · Brown ...
People also ask
Fingerprint. Dive into the research topics of 'Countering Attacker Data Manipulation in Security Games'. Together they form a unique fingerprint.
We apply the cyber deception techniques in the field of network security and study the impact of the deception on attacker's beliefs using the quantitative.