4.7 Article

Single-Leader-Multiple-Followers Stackelberg Security Game With Hypergame Framework

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Automation & Control Systems

Distributed algorithm for ε-generalized Nash equilibria with uncertain coupled constraints

Guanpu Chen et al.

Summary: This paper presents a distributed algorithm for finding generalized Nash equilibria with uncertain coupled constraints, by approximating general convex sets and transforming the problem into a variational inequality. It proves that the solution induces an epsilon-generalized Nash equilibrium of the original game in the worst case, and proposes convergence analysis methods using Lyapunov functions and variational inequalities.

AUTOMATICA (2021)

Article Automation & Control Systems

Learning and Information Manipulation: Repeated Hypergames for Cyber-Physical Security

Craig Bakker et al.

IEEE CONTROL SYSTEMS LETTERS (2020)

Article Computer Science, Interdisciplinary Applications

Hypergames and Cyber-Physical Security for Control Systems

Craig Bakker et al.

ACM TRANSACTIONS ON CYBER-PHYSICAL SYSTEMS (2020)

Article Psychology, Experimental

Toward Personalized Deceptive Signaling for Cyber Defense Using Cognitive Models

Edward A. Cranford et al.

TOPICS IN COGNITIVE SCIENCE (2020)

Article Automation & Control Systems

Learning implicit information in Bayesian games with knowledge transfer

Guanpu Chen et al.

CONTROL THEORY AND TECHNOLOGY (2020)

Article Computer Science, Theory & Methods

Game Theory and Reinforcement Learning Based Secure Edge Caching in Mobile Social Networks

Qichao Xu et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2020)

Article Computer Science, Theory & Methods

Online Location Trace Privacy: An Information Theoretic Approach

Wenjing Zhang et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2019)

Article Computer Science, Theory & Methods

Modeling and Analysis of Leaky Deception Using Signaling Games With Evidence

Jeffrey Pawlick et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2019)

Article Computer Science, Theory & Methods

Interdependent Strategic Security Risk Management With Bounded Rationality in the Internet of Things

Juntao Chen et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2019)

Article Computer Science, Theory & Methods

On the Security-Privacy Tradeoff in Collaborative Security: A Quantitative Information Flow Game Perspective

Richeng Jin et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2019)

Article Engineering, Industrial

Modeling a multi-target attacker-defender game with multiple attack types

Jing Zhang et al.

RELIABILITY ENGINEERING & SYSTEM SAFETY (2019)

Article Economics

Coevolution of deception and preferences: Darwin and Nash meet Machiavelli

Yuval Heller et al.

GAMES AND ECONOMIC BEHAVIOR (2019)

Article Computer Science, Theory & Methods

Coordinated Multiple-Relays Based Physical-Layer Security Improvement: A Single-Leader Multiple-Followers Stackelberg Game Scheme

He Fang et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2018)

Article Automation & Control Systems

DoS Attack Energy Management Against Remote State Estimation

Heng Zhang et al.

IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS (2018)

Article Operations Research & Management Science

Generalized Nash equilibrium with stable belief hierarchies in static games with unawareness

Yasuo Sasaki

ANNALS OF OPERATIONS RESEARCH (2017)

Article Management

Modeling Systems of Holding Back as Hypergames and their Connections with Systems Intelligence

Yasuo Sasaki et al.

SYSTEMS RESEARCH AND BEHAVIORAL SCIENCE (2015)

Article Computer Science, Theory & Methods

Game Theory Meets Network Security and Privacy

Mohammad Hossein Manshaei et al.

ACM COMPUTING SURVEYS (2013)

Article Computer Science, Information Systems

From information security to cyber security

Rossouw von Solms et al.

COMPUTERS & SECURITY (2013)

Article Computer Science, Theory & Methods

Characterizing Honeypot-Captured Cyber Attacks: Statistical Framework and Case Study

Zhenxin Zhan et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2013)

Article Engineering, Electrical & Electronic

Coalitional Games in Partition Form for Joint Spectrum Sensing and Access in Cognitive Radio Networks

Walid Saad et al.

IEEE JOURNAL OF SELECTED TOPICS IN SIGNAL PROCESSING (2012)

Article Management

Defending against multiple different attackers

Kjell Hausken et al.

EUROPEAN JOURNAL OF OPERATIONAL RESEARCH (2011)

Article Automation & Control Systems

Protecting complex infrastructures against multiple strategic attackers

Kjell Hausken

INTERNATIONAL JOURNAL OF SYSTEMS SCIENCE (2011)

Article Computer Science, Artificial Intelligence

Stackelberg vs. Nash in Security Games: An Extended Investigation of Interchangeability, Equivalence, and Uniqueness

Dmytro Korzhyk et al.

JOURNAL OF ARTIFICIAL INTELLIGENCE RESEARCH (2011)

Article Economics

Leadership games with convex strategy sets

Bernhard von Stengel et al.

GAMES AND ECONOMIC BEHAVIOR (2010)

Article Computer Science, Theory & Methods

A Game Theoretical Framework on Intrusion Detection in Heterogeneous Networks

Lin Chen et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2009)

Article Economics

The Costs of Deception: Evidence from Psychology

Andreas Ortmann

EXPERIMENTAL ECONOMICS (2002)