Filters








226 Hits in 3.9 sec

Game Theory for Cyber Deception: A Tutorial [article]

Quanyan Zhu
2019 arXiv   pre-print
In this tutorial, we present an overview of game-theoretic models and design mechanisms for deception and counter-deception.  ...  Game theory provides an ideal set of tools to develop such a framework of deception.  ...  Then, the tutorial introduces the baseline signal games and the analytical methods for two-person deception games [3, 28, 30, 47] .  ... 
arXiv:1903.01442v1 fatcat:prcxrq3eq5hq3arhfboq6uhb7u

Cybersafety Threats - from Deception to Aggression (Dagstuhl Seminar 19302)

Zinaida Benenson, Marianne Junger, Daniela Oliveira, Gianluca Stringhini, Michael Wagner
2019 Dagstuhl Reports  
In particular, cyber deception and cyber aggression practices are increasing their reach and seriousness, leading to a number of harmful practices such as phishing, disinformation, radicalization, and  ...  Through five days of brainstorming and discussion, the participants developed a roadmap for future research on these topics, along four directions: modelling the attackers, measuring human behavior, detection  ...  The research question I have for this workshop related to the problem described above is: How can we in a privacy friendly way take "work study" / "time study" measurements at an IT company?  ... 
doi:10.4230/dagrep.9.7.117 dblp:journals/dagstuhl-reports/BenensonJOS19 fatcat:zpxov2sgzfhppdnrz662uckcx4

Smartphone Malware and Its Propagation Modeling: A Survey

Sancheng Peng, Shui Yu, Aimin Yang
2014 IEEE Communications Surveys and Tutorials  
In order to understand the propagation behavior of smartphone malware, we recall generic epidemic models as a foundation for further exploration.  ...  A representative unified and integrated propagation model remains unknown to the cyber security community.  ...  means Deceptive means Deceptive means Deceptive means Deceptive means Attack target Local file Network host or network it- self System System System System System Human inter  ... 
doi:10.1109/surv.2013.070813.00214 fatcat:oya4n2bn4naqbeuo4cvzgx6fkq

A Survey on Security and Privacy of 5G Technologies: Potential Solutions, Recent Advancements and Future Directions

Rabia Khan, Pardeep Kumar, Dushantha Nalin K. Jayakody, Madhusanka Liyanage
2019 IEEE Communications Surveys and Tutorials  
In [247] , authors formulated a Prospect Theory (PT)-based smart attack game to resist the smart attack for the UAV transmit power allocator on multiple radio channel.  ...  Authors modeled a cooperation problem as a coalitional game for WFRFT-based PHY-layer security with non-transferable utility.  ... 
doi:10.1109/comst.2019.2933899 fatcat:bulfng6levdelgmel7oxoi6pna

Table of contents

2021 IEEE Communications Surveys and Tutorials  
Giovanni Schmid 2429 A Survey of Defensive Deception: Approaches Using Game Theory and Machine Learning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  ...  Peter Adam Hoeher, Jan Sticklus, and Andrej Harlakin 2630 VEHICULAR AND SENSOR COMMUNICATIONS Applications of Game Theory in Vehicular Networks: A Survey . . . . . . . . . . . . . . . . . . . . . . . .  ... 
doi:10.1109/comst.2021.3125392 fatcat:a2jxrepkdjfqtmeio6ue5ivojq

Game Theory Meets Network Security: A Tutorial at ACM CCS [article]

Quanyan Zhu, Stefan Rass
2018 pre-print
This tutorial provides an overview of diverse methodologies from game theory that includes games of incomplete information, dynamic games, mechanism design theory to offer a modern theoretic underpinning  ...  , game and decision theory.  ...  s belief: A dynamic game approach to deception by design for proactive network security.  ... 
doi:10.1145/3243734.3264421 arXiv:1808.08066v1 fatcat:onpk3vwpjjb4rlq4moz6mkbcku

IEEE Communications Surveys and Tutorials

Dusit Tao Niyato
2021 IEEE Communications Surveys and Tutorials  
A brief account for each of these papers is given below.  ...  I WELCOME you to the fourth issue of the IEEE COMMUNICATIONS SURVEYS AND TUTORIALS in 2021. This issue includes 23 papers covering different aspects of communication networks.  ...  [A13] presents a tutorial and survey of the state-of-the-art defensive deception techniques leveraging game theory and machine learning.  ... 
doi:10.1109/comst.2021.3124645 fatcat:lsax4a6u2rhg3idcgbewyr5sfm

HoneyCar: A Framework to Configure HoneypotVulnerabilities on the Internet of Vehicles [article]

Sakshyam Panda, Stefan Rass, Sotiris Moschoyiannis, Kaitai Liang, George Loukas, Emmanouil Panaousis
2021 arXiv   pre-print
In this paper, we present HoneyCar, a novel decision support framework for honeypot deception in IoV.  ...  By taking a game-theoretic approach, we model the adversarial interaction as a repeated imperfect-information zero-sum game in which the IoV network administrator chooses a set of vulnerabilities to offer  ...  Numerous papers have used game theory to model deception [9] , [10] , [11] and other security challenges [12] , [13] .  ... 
arXiv:2111.02364v1 fatcat:lwnkkebiafe5jasy7pw4226p2a

Stackelberg Security Games: Looking Beyond a Decade of Success

Arunesh Sinha, Fei Fang, Bo An, Christopher Kiekintveld, Milind Tambe
2018 Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence  
Furthermore, deployed SSG-based applications are one of most successful examples of game theory applications in the real world.  ...  The Stackelberg Security Game (SSG) model has been immensely influential in security research since it was introduced roughly a decade ago.  ...  A recent tutorial named "Advances in Game Theory for Security and Privacy" in ACM-EC 2017 (slides available online) provides more material for perusal.  ... 
doi:10.24963/ijcai.2018/775 dblp:conf/ijcai/SinhaFAKT18 fatcat:vdiyb6i46jfwhm5dlhjph4cjme

Cybersecurity in Robotics: Challenges, Quantitative Modeling, and Practice

Quanyan Zhu, Stefan Rass, Bernhard Dieber, Víctor Mayoral Vilches
2021 Foundations and Trends in Robotics  
strategies, moving target defense, and cyber deception.  ...  Game theory is a promising scientific method to address this need.  ... 
doi:10.1561/2300000061 fatcat:a53qsslhvjdkxhaswotnai4u7i

Linguistic Politeness Analysis of Indonesia's Prominent YouTube Influencers

Rizmadina Amalia Shalekhah, Septy Artika Estayani, Melinda Sari, Raden Arief Nugroho
2020 Journal of English Language Teaching and Linguistics  
This type of content is dominated by male Youtuber Meanwhile, according to Dynel (2015) theory, the category that gets the highest percentage in the category of insults with 43% of the total data.  ...  Based on a review of several studies, it was found that there are similarities and differences between one study and another.  ...  For instance live streams, walkthroughs, tutorials, challenges, game reviews, or montages. Moreover, within the competitive niche, gaming videos are among the most-searched topics on YouTube.  ... 
doi:10.21462/jeltl.v5i3.464 fatcat:gxnjksag6jf5le7rq2yvpd5r3a

Survey of Attack Projection, Prediction, and Forecasting in Cyber Security

Martin Husak, Jana Komarkova, Elias Bou-Harb, Pavel Celeda
2019 IEEE Communications Surveys and Tutorials  
We further discuss machine learning and data mining approaches, that have gained a lot of attention recently and appears promising for such a constantly changing environment, which is cyber security.  ...  This paper provides a survey of prediction, and forecasting methods used in cyber security.  ...  The concept of a game solution in game theory is not explicit. The most commonly used solution concept is a Nash equilibrium [52] .  ... 
doi:10.1109/comst.2018.2871866 fatcat:3pswasu5crepxozbwaylih6qiy

Reports of the 2016 AAAI Workshop Program

Stefano Albrecht, Bruno Bouchard, John S. Brownstein, David L. Buckeridge, Cornelia Caragea, Kevin M. Carter, Adnan Darwiche, Blaz Fortuna, Yannick Francillette, Sébastien Gaboury, C. Lee Giles, Marko Grobelnik (+23 others)
2016 The AI Magazine  
Workshop participants met and discussed issues with a selected focus — providing an informal setting for active exchange among researchers, developers and users on topics of current interest.  ...  Security (WS-16-03), Artificial Intelligence for Smart Grids and Smart Buildings (WS-16-04), Beyond NP (WS-16-05), Computer Poker and Imperfect Information Games (WS-16-06), Declarative Learning Based  ...  Artificial Intelligence for Cyber Security This workshop focused on research and applications of artificial intelligence to cyber security, including machine learning, game theory, natural language processing  ... 
doi:10.1609/aimag.v37i3.2680 fatcat:gutumrsprzg2vngp77hezwyuz4

Phish Derby: Shoring the Human Shield Through Gamified Phishing Attacks

Matthew Canham, Clay Posey, Michael Constantino
2022 Frontiers in Education  
We discuss these findings and describe how focusing on motivating the good in employee cyber behaviors is a necessary yet too often overlooked component in organizations whose training cyber cultures are  ...  Employees volunteered to compete for prizes during this special event and were instructed to report suspicious emails as potential phishing attacks.  ...  Gamification refers to the “use of computer games and features of games for non-game purposes” (Fleming et al., 2020, p. 2).  ... 
doi:10.3389/feduc.2021.807277 fatcat:3qc26dd7qbf4bje4kp3pcclfke

Reports of the Workshops Held at the 2019 AAAI Conference on Artificial Intelligence

Guy Barash, Mauricio Castillo-Effen, Niyati Chhaya, Peter Clark, Huáscar Espinoza, Eitan Farchi, Christopher Geib, Odd Erik Gundersen, Seán HÉigeartaigh, José Hernández-Orallo, Chiori Hori, Xiaowei Huang (+25 others)
2019 The AI Magazine  
There were fifteen workshops in the program: Affective Content Analysis: Modeling Affect-in-Action, Agile Robotics for Industrial Automation Competition, Artificial Intelligence for Cyber Security, Artificial  ...  from Games, Network Interpretability for Deep Learning, Plan, Activity, and Intent Recognition, Reasoning and Learning for Human-Machine Dialogues, Reasoning for Complex Question Answering, Recommender  ...  of deception.  ... 
doi:10.1609/aimag.v40i3.4981 fatcat:tigkbqqkbjd4rcqew4dtallcze
« Previous Showing results 1 — 15 out of 226 results