Protected: [review #9] Decision and Game Theory for Security | 10-11th International Conference, GameSec 2019-2020
There is no excerpt because this is a protected post.
There is no excerpt because this is a protected post.
Decision and Game Theory for Security: 12th International Conference, GameSec 2021 Virtual Event, October 25-27, 2021 Proceedings
There is no excerpt because this is a protected post.
Decision and Game Theory for Security: 13th International Conference, GameSec 2022 Pittsburgh, PA, USA, October 26-28, 2022 Proceedings
In this paper, we study a proactive defense mechanism against jamming in multi-hop relay networks, in which one or more network sources introduce a deceptive network flow along a disjoint routing path.
There is no excerpt because this is a protected post.
Game Theory | Types of Interactions, Equilibrium Concepts
Hazra, T.; Anjaria, K. Applications of game theory in deep learning: A survey. Multimed. Tools Appl. 2022, 81, 8963–8994.
Categorize the game theory of defensive deception for cybersecurity and privacy, and review papers that investigate it.
Reviewing “Do You Really Need to Disguise Normal Servers as Honeypots?” papers and looking for improvements
Learn about the first application of signaling, job-market signaling by Michael Spence.