Oct 31, 2021 · In this work, we investigate the defender's counteraction against attacker deception in a Stackelberg security game setting.
Defending against attackers with unknown behavior is an important area of research in security games. A well-established approach is to utilize his- torical ...
Defending against attackers with unknown behav- ior is an important area of research in security games. A well-established approach is to utilize historical ...
In this paper, we investigate how a wary defender can defend against such deceptive attacker. We provide four main contributions.
We provide four main contributions. First, we develop a new technique to estimate attacker true behavior despite data manipulation by the clever adversary.
We provide four main contributions. First, we develop a new technique to estimate attacker true behavior despite data manipulation by the clever adversary.
In this paper, we investigate how a wary defender can defend against such deceptive attacker. We provide four main contributions. First, we develop a new ...
Albarran, S.E., Clempner, J.B.: A Stackelberg security Markov game based on partial information for strategic decision making against unexpected attacks. · Brown ...
People also ask
What is data manipulation in cyber security?
How is game theory used in cyber security?
Fingerprint. Dive into the research topics of 'Countering Attacker Data Manipulation in Security Games'. Together they form a unique fingerprint.
We apply the cyber deception techniques in the field of network security and study the impact of the deception on attacker's beliefs using the quantitative.