相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。Distributed algorithm for ε-generalized Nash equilibria with uncertain coupled constraints
Guanpu Chen et al.
AUTOMATICA (2021)
Learning and Information Manipulation: Repeated Hypergames for Cyber-Physical Security
Craig Bakker et al.
IEEE CONTROL SYSTEMS LETTERS (2020)
Hypergames and Cyber-Physical Security for Control Systems
Craig Bakker et al.
ACM TRANSACTIONS ON CYBER-PHYSICAL SYSTEMS (2020)
Toward Personalized Deceptive Signaling for Cyber Defense Using Cognitive Models
Edward A. Cranford et al.
TOPICS IN COGNITIVE SCIENCE (2020)
Learning implicit information in Bayesian games with knowledge transfer
Guanpu Chen et al.
CONTROL THEORY AND TECHNOLOGY (2020)
Game Theory and Reinforcement Learning Based Secure Edge Caching in Mobile Social Networks
Qichao Xu et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2020)
Using game theory to optimize the allocation of defensive resources on a city scale to protect chemical facilities against multiple types of attackers
Qilin Feng et al.
RELIABILITY ENGINEERING & SYSTEM SAFETY (2019)
Online Location Trace Privacy: An Information Theoretic Approach
Wenjing Zhang et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2019)
Modeling and Analysis of Leaky Deception Using Signaling Games With Evidence
Jeffrey Pawlick et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2019)
Interdependent Strategic Security Risk Management With Bounded Rationality in the Internet of Things
Juntao Chen et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2019)
On the Security-Privacy Tradeoff in Collaborative Security: A Quantitative Information Flow Game Perspective
Richeng Jin et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2019)
Modeling a multi-target attacker-defender game with multiple attack types
Jing Zhang et al.
RELIABILITY ENGINEERING & SYSTEM SAFETY (2019)
Coevolution of deception and preferences: Darwin and Nash meet Machiavelli
Yuval Heller et al.
GAMES AND ECONOMIC BEHAVIOR (2019)
Coordinated Multiple-Relays Based Physical-Layer Security Improvement: A Single-Leader Multiple-Followers Stackelberg Game Scheme
He Fang et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2018)
DoS Attack Energy Management Against Remote State Estimation
Heng Zhang et al.
IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS (2018)
Generalized Nash equilibrium with stable belief hierarchies in static games with unawareness
Yasuo Sasaki
ANNALS OF OPERATIONS RESEARCH (2017)
Modeling Systems of Holding Back as Hypergames and their Connections with Systems Intelligence
Yasuo Sasaki et al.
SYSTEMS RESEARCH AND BEHAVIORAL SCIENCE (2015)
Game Theory Meets Network Security and Privacy
Mohammad Hossein Manshaei et al.
ACM COMPUTING SURVEYS (2013)
From information security to cyber security
Rossouw von Solms et al.
COMPUTERS & SECURITY (2013)
Characterizing Honeypot-Captured Cyber Attacks: Statistical Framework and Case Study
Zhenxin Zhan et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2013)
EXISTENCE, UNIQUENESS, AND COMPUTATION OF ROBUST NASH EQUILIBRIA IN A CLASS OF MULTI-LEADER-FOLLOWER GAMES
Ming Hu et al.
SIAM JOURNAL ON OPTIMIZATION (2013)
Coalitional Games in Partition Form for Joint Spectrum Sensing and Access in Cognitive Radio Networks
Walid Saad et al.
IEEE JOURNAL OF SELECTED TOPICS IN SIGNAL PROCESSING (2012)
Defending against multiple different attackers
Kjell Hausken et al.
EUROPEAN JOURNAL OF OPERATIONAL RESEARCH (2011)
Protecting complex infrastructures against multiple strategic attackers
Kjell Hausken
INTERNATIONAL JOURNAL OF SYSTEMS SCIENCE (2011)
Stackelberg vs. Nash in Security Games: An Extended Investigation of Interchangeability, Equivalence, and Uniqueness
Dmytro Korzhyk et al.
JOURNAL OF ARTIFICIAL INTELLIGENCE RESEARCH (2011)
Leadership games with convex strategy sets
Bernhard von Stengel et al.
GAMES AND ECONOMIC BEHAVIOR (2010)
A Game Theoretical Framework on Intrusion Detection in Heterogeneous Networks
Lin Chen et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2009)
Human errors and violations in computer and information security: The viewpoint of network administrators and security specialists
Sara Kraemer et al.
APPLIED ERGONOMICS (2007)
The Costs of Deception: Evidence from Psychology
Andreas Ortmann
EXPERIMENTAL ECONOMICS (2002)