A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Game Theory for Cyber Deception: A Tutorial
[article]
2019
arXiv
pre-print
In this tutorial, we present an overview of game-theoretic models and design mechanisms for deception and counter-deception. ...
Game theory provides an ideal set of tools to develop such a framework of deception. ...
Then, the tutorial introduces the baseline signal games and the analytical methods for two-person deception games [3, 28, 30, 47] . ...
arXiv:1903.01442v1
fatcat:prcxrq3eq5hq3arhfboq6uhb7u
Cybersafety Threats - from Deception to Aggression (Dagstuhl Seminar 19302)
2019
Dagstuhl Reports
In particular, cyber deception and cyber aggression practices are increasing their reach and seriousness, leading to a number of harmful practices such as phishing, disinformation, radicalization, and ...
Through five days of brainstorming and discussion, the participants developed a roadmap for future research on these topics, along four directions: modelling the attackers, measuring human behavior, detection ...
The research question I have for this workshop related to the problem described above is: How can we in a privacy friendly way take "work study" / "time study" measurements at an IT company? ...
doi:10.4230/dagrep.9.7.117
dblp:journals/dagstuhl-reports/BenensonJOS19
fatcat:zpxov2sgzfhppdnrz662uckcx4
Smartphone Malware and Its Propagation Modeling: A Survey
2014
IEEE Communications Surveys and Tutorials
In order to understand the propagation behavior of smartphone malware, we recall generic epidemic models as a foundation for further exploration. ...
A representative unified and integrated propagation model remains unknown to the cyber security community. ...
means
Deceptive
means
Deceptive
means
Deceptive
means
Deceptive
means
Attack target
Local file
Network host
or network it-
self
System
System
System
System
System
Human inter ...
doi:10.1109/surv.2013.070813.00214
fatcat:oya4n2bn4naqbeuo4cvzgx6fkq
A Survey on Security and Privacy of 5G Technologies: Potential Solutions, Recent Advancements and Future Directions
2019
IEEE Communications Surveys and Tutorials
In [247] , authors formulated a Prospect Theory (PT)-based smart attack game to resist the smart attack for the UAV transmit power allocator on multiple radio channel. ...
Authors modeled a cooperation problem as a coalitional game for WFRFT-based PHY-layer security with non-transferable utility. ...
doi:10.1109/comst.2019.2933899
fatcat:bulfng6levdelgmel7oxoi6pna
Table of contents
2021
IEEE Communications Surveys and Tutorials
Giovanni Schmid 2429 A Survey of Defensive Deception: Approaches Using Game Theory and Machine Learning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ...
Peter Adam Hoeher, Jan Sticklus, and Andrej Harlakin 2630 VEHICULAR AND SENSOR COMMUNICATIONS Applications of Game Theory in Vehicular Networks: A Survey . . . . . . . . . . . . . . . . . . . . . . . . ...
doi:10.1109/comst.2021.3125392
fatcat:a2jxrepkdjfqtmeio6ue5ivojq
Game Theory Meets Network Security: A Tutorial at ACM CCS
[article]
2018
pre-print
This tutorial provides an overview of diverse methodologies from game theory that includes games of incomplete information, dynamic games, mechanism design theory to offer a modern theoretic underpinning ...
, game and decision theory. ...
s belief: A dynamic game approach to deception by design for proactive network security. ...
doi:10.1145/3243734.3264421
arXiv:1808.08066v1
fatcat:onpk3vwpjjb4rlq4moz6mkbcku
IEEE Communications Surveys and Tutorials
2021
IEEE Communications Surveys and Tutorials
A brief account for each of these papers is given below. ...
I WELCOME you to the fourth issue of the IEEE COMMUNICATIONS SURVEYS AND TUTORIALS in 2021. This issue includes 23 papers covering different aspects of communication networks. ...
[A13] presents a tutorial and survey of the state-of-the-art defensive deception techniques leveraging game theory and machine learning. ...
doi:10.1109/comst.2021.3124645
fatcat:lsax4a6u2rhg3idcgbewyr5sfm
HoneyCar: A Framework to Configure HoneypotVulnerabilities on the Internet of Vehicles
[article]
2021
arXiv
pre-print
In this paper, we present HoneyCar, a novel decision support framework for honeypot deception in IoV. ...
By taking a game-theoretic approach, we model the adversarial interaction as a repeated imperfect-information zero-sum game in which the IoV network administrator chooses a set of vulnerabilities to offer ...
Numerous papers have used game theory to model deception [9] , [10] , [11] and other security challenges [12] , [13] . ...
arXiv:2111.02364v1
fatcat:lwnkkebiafe5jasy7pw4226p2a
Stackelberg Security Games: Looking Beyond a Decade of Success
2018
Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence
Furthermore, deployed SSG-based applications are one of most successful examples of game theory applications in the real world. ...
The Stackelberg Security Game (SSG) model has been immensely influential in security research since it was introduced roughly a decade ago. ...
A recent tutorial named "Advances in Game Theory for Security and Privacy" in ACM-EC 2017 (slides available online) provides more material for perusal. ...
doi:10.24963/ijcai.2018/775
dblp:conf/ijcai/SinhaFAKT18
fatcat:vdiyb6i46jfwhm5dlhjph4cjme
Cybersecurity in Robotics: Challenges, Quantitative Modeling, and Practice
2021
Foundations and Trends in Robotics
strategies, moving target defense, and cyber deception. ...
Game theory is a promising scientific method to address this need. ...
doi:10.1561/2300000061
fatcat:a53qsslhvjdkxhaswotnai4u7i
Linguistic Politeness Analysis of Indonesia's Prominent YouTube Influencers
2020
Journal of English Language Teaching and Linguistics
This type of content is dominated by male Youtuber Meanwhile, according to Dynel (2015) theory, the category that gets the highest percentage in the category of insults with 43% of the total data. ...
Based on a review of several studies, it was found that there are similarities and differences between one study and another. ...
For instance live streams, walkthroughs, tutorials, challenges, game reviews, or montages. Moreover, within the competitive niche, gaming videos are among the most-searched topics on YouTube. ...
doi:10.21462/jeltl.v5i3.464
fatcat:gxnjksag6jf5le7rq2yvpd5r3a
Survey of Attack Projection, Prediction, and Forecasting in Cyber Security
2019
IEEE Communications Surveys and Tutorials
We further discuss machine learning and data mining approaches, that have gained a lot of attention recently and appears promising for such a constantly changing environment, which is cyber security. ...
This paper provides a survey of prediction, and forecasting methods used in cyber security. ...
The concept of a game solution in game theory is not explicit. The most commonly used solution concept is a Nash equilibrium [52] . ...
doi:10.1109/comst.2018.2871866
fatcat:3pswasu5crepxozbwaylih6qiy
Reports of the 2016 AAAI Workshop Program
2016
The AI Magazine
Workshop participants met and discussed issues with a selected focus — providing an informal setting for active exchange among researchers, developers and users on topics of current interest. ...
Security (WS-16-03), Artificial Intelligence for Smart Grids and Smart Buildings (WS-16-04), Beyond NP (WS-16-05), Computer Poker and Imperfect Information Games (WS-16-06), Declarative Learning Based ...
Artificial Intelligence for Cyber Security This workshop focused on research and applications of artificial intelligence to cyber security, including machine learning, game theory, natural language processing ...
doi:10.1609/aimag.v37i3.2680
fatcat:gutumrsprzg2vngp77hezwyuz4
Phish Derby: Shoring the Human Shield Through Gamified Phishing Attacks
2022
Frontiers in Education
We discuss these findings and describe how focusing on motivating the good in employee cyber behaviors is a necessary yet too often overlooked component in organizations whose training cyber cultures are ...
Employees volunteered to compete for prizes during this special event and were instructed to report suspicious emails as potential phishing attacks. ...
Gamification refers to the “use of computer games and features of games for non-game purposes” (Fleming et al., 2020, p. 2). ...
doi:10.3389/feduc.2021.807277
fatcat:3qc26dd7qbf4bje4kp3pcclfke
Reports of the Workshops Held at the 2019 AAAI Conference on Artificial Intelligence
2019
The AI Magazine
There were fifteen workshops in the program: Affective Content Analysis: Modeling Affect-in-Action, Agile Robotics for Industrial Automation Competition, Artificial Intelligence for Cyber Security, Artificial ...
from Games, Network Interpretability for Deep Learning, Plan, Activity, and Intent Recognition, Reasoning and Learning for Human-Machine Dialogues, Reasoning for Complex Question Answering, Recommender ...
of deception. ...
doi:10.1609/aimag.v40i3.4981
fatcat:tigkbqqkbjd4rcqew4dtallcze
« Previous
Showing results 1 — 15 out of 226 results