[review #5] Deceptive routing in relay networks
In this paper, we study a proactive defense mechanism against jamming in multi-hop relay networks, in which one or more network sources introduce a deceptive network flow along a disjoint routing path.
In this paper, we study a proactive defense mechanism against jamming in multi-hop relay networks, in which one or more network sources introduce a deceptive network flow along a disjoint routing path.
There is no excerpt because this is a protected post.
Game Theory | Types of Interactions, Equilibrium Concepts
Hazra, T.; Anjaria, K. Applications of game theory in deep learning: A survey. Multimed. Tools Appl. 2022, 81, 8963–8994.
Categorize the game theory of defensive deception for cybersecurity and privacy, and review papers that investigate it.
Reviewing “Do You Really Need to Disguise Normal Servers as Honeypots?” papers and looking for improvements
Learn about the first application of signaling, job-market signaling by Michael Spence.
Describe how to find a PBE in a signaling game.
Introduce signaling games and explain how PBEs are defined in these games.
Define a perfect Bayesian equilibrium (PBE), explain its existence, how it relates to existing equilibria (NE/SPE), and finally how this relationship can be used to find a PBE.
We explain how to define sequential rationality in dynamic Bayesian games and why traditional equilibria (SPE or NE) do not satisfy sequential rationality.