Filters








73,280 Hits in 6.3 sec

Resilience of LTE eNode B against smart jammer in infinite-horizon asymmetric repeated zero-sum game

Farhan M. Aziz, Lichun Li, Jeff S. Shamma, Gordon L. Stüber
2020 Physical Communication  
It has been shown in game-theoretic literature that security strategies provide optimal solution in zero-sum games and that both players' security strategies in an infinite-horizon asymmetric repeated  ...  The simulation results show that smart jammer maintains its dominance at a long range of prior probability values by playing non-revealing and misleading strategies against the network for its long-term  ...  Since, the prior is common knowledge, it alleviates eNode B from "learning" and full monitoring in a repeated game.  ... 
doi:10.1016/j.phycom.2019.100989 fatcat:7morvf5dobbfzmxfv4e6vrgava

Smart Jammer and LTE Network Strategies in An Infinite-Horizon Zero-Sum Repeated Game with Asymmetric and Incomplete Information [article]

Farhan M. Aziz, Lichun Li, Jeff S. Shamma, Gordon L. Stuber
2019 arXiv   pre-print
The main purpose of this article is to construct efficient suboptimal strategies for both players that can be used to solve the above-mentioned infinite-horizon repeated game with asymmetric and incomplete  ...  It has been shown in game-theoretic literature that security strategies provide optimal solution in zero-sum games.  ...  Since, the prior is common knowledge, it alleviates eNode B from "learning" and full monitoring in a repeated game.  ... 
arXiv:1904.11184v1 fatcat:w3ieof6fdbfhfc2lffnr4wmvni

Learning to compete, coordinate, and cooperate in repeated games using reinforcement learning

Jacob W. Crandall, Michael A. Goodrich
2010 Machine Learning  
We show that M-Qubed learns to make profitable compromises across a wide-range of repeated matrix games played with many kinds of learners.  ...  Additionally, we show that, in two-player games, M-Qubed's average payoffs approach the value of the Nash bargaining solution in self play.  ...  We chose this formulation to better deal with the need to play mixed strategies in repeated games.  ... 
doi:10.1007/s10994-010-5192-9 fatcat:2jpcbyx5zzaibppnotn5bw45pi

QFlip: An Adaptive Reinforcement Learning Strategy for the FlipIt Security Game [article]

Lisa Oakley, Alina Oprea
2019 arXiv   pre-print
Finally, we introduce a generalized QFlip strategy with composite state space that outperforms a Greedy strategy for several distributions including Periodic and Uniform, without prior knowledge of the  ...  We prove theoretical results on the convergence of our new strategy against an opponent playing with a Periodic strategy.  ...  Army Combat Capabilities Development Command Army Research Laboratory and was accomplished under Cooperative Agreement Number W911NF-13-2-0045 (ARL Cyber Security CRA).  ... 
arXiv:1906.11938v2 fatcat:qa2kmlnolrhztgrbiyry6k3nru

Jammer-Type Estimation in LTE With a Smart Jammer Repeated Game

Farhan M. Aziz, Jeff S. Shamma, Gordon L. Stuber
2017 IEEE Transactions on Vehicular Technology  
games with perfect monitoring.  ...  The proposed mechanism helps the network resolve uncertainty about the state of nature (jammer type) so that it can compute a repeated-game strategy conditioned on its estimate.  ...  However, most of the prior work on asymmetric zerosum repeated games revolves around the informed player's viewpoint.  ... 
doi:10.1109/tvt.2017.2672682 fatcat:oousfbe2jbdapnqhgorrntux6u

Playing Repeated Network Interdiction Games with Semi-Bandit Feedback

Qingyu Guo, Bo An, Long Tran-Thanh
2017 Proceedings of the Twenty-Sixth International Joint Conference on Artificial Intelligence  
We study repeated network interdiction games with no prior knowledge of the adversary and the environment, which can model many real world network security domains.  ...  In particular, we model the repeated network interdiction game with no prior knowledge as an online linear optimization problem, for which a novel and efficient online learning algorithm, SBGA, is proposed  ...  Conclusions This paper provides the first defender strategy in repeated network security domains with no prior knowledge of the adversarial behavior model and the environment.  ... 
doi:10.24963/ijcai.2017/515 dblp:conf/ijcai/GuoAT17 fatcat:mqgw27cttvdsngnsyzijgq2vy4

A Serious Game for Healthcare Industry: Information Security Awareness Training Program for Hospital Universiti Kebangsaan Malaysia

Arash Ghazvini, Zarina Shukur
2018 International Journal of Advanced Computer Science and Applications  
Serious games benefit learning as the games are fun to play and motivate learners to participate and interact with learning activities.  ...  This paper aims to develop an information security awareness training program for the healthcare industry to ensure the appropriate protection of electronic health systems.  ...  Serious Game Attribute  Incremental Learning The targeted audience is general employees with basic knowledge of information security.  ... 
doi:10.14569/ijacsa.2018.090932 fatcat:ct32xwttlbeppgzrp2wusjlezq

Learning to Stand in the Other's Shoes

Cleotilde Gonzalez, Lelyn D. Saner, Laurie Z. Eisenberg
2012 Social science computer review  
Results revealed an improvement in students' game scores and a reduction in the correlations between scores and religion, political affiliation, and game performance across games played.  ...  Results suggest that the understanding of the conflict that is provided by the game simulation combined with practice may make it possible to reduce personal bias and learn to stand in another's shoes  ...  The authors declared no potential conflicts of interest with respect to the research, authorship, and/or publication of this article.  ... 
doi:10.1177/0894439312453979 fatcat:4ibvgtz4jjayvfxb2pd5bnbvlm

Time and the Prisoner's Dilemma [article]

Yishay Mor, Jeffrey S. Rosenschein
2007 arXiv   pre-print
In addition, a variant of the repeated Prisoner's Dilemma game is suggested, in which players have the choice of opting out.  ...  This paper examines the integration of computational complexity into game theoretic models. The example focused on is the Prisoner's Dilemma, repeated for a finite length of time.  ...  Furthermore, they require vast amounts of prior knowledge about the different players in the population.  ... 
arXiv:cs/0701139v1 fatcat:mmrnw7lfffhcpb7jq2nw6ibqnm

Learning against multiple opponents

Thuc Vu, Rob Powers, Yoav Shoham
2006 Proceedings of the fifth international joint conference on Autonomous agents and multiagent systems - AAMAS '06  
We also demonstrate that the algorithm for stationary strategies outperforms existing algorithms in tests spanning a wide variety of repeated games with more than two players.  ...  We address the problem of learning in repeated n-player (as opposed to 2-player) general-sum games, paying particular attention to the rarely addressed situation in which there are a mixture of agents  ...  Of particular concern is looking for ways to weaken the requirement of full prior knowledge about the payoffs of the game.  ... 
doi:10.1145/1160633.1160766 dblp:conf/atal/VuPS06 fatcat:673fxwfxwffn3myyo36q7ztuca

Learning against opponents with bounded memory

Rob Powers, Yoav Shoham
2005 International Joint Conference on Artificial Intelligence  
We propose extending existing criteria to apply to a class of adaptive opponents with bounded memory.  ...  show an algorithm that provably achieves an ǫ-best response against this richer class of opponents while simultaneously guaranteeing a minimum payoff against any opponent and performing well in self-play  ...  Godfather was motivated by the folk theorem for repeated games and selects some outcome in the game matrix with greater payoff for each agent than their security values and plays its portion of the target  ... 
dblp:conf/ijcai/PowersS05 fatcat:ewf2ssdqn5g6ph5h4sl3g4kuvu

Control-Alt-Hack

Tamara Denning, Adam Lerner, Adam Shostack, Tadayoshi Kohno
2013 Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security - CCS '13  
We scoped, designed, produced, and evaluated the effectiveness of a recreational tabletop card game created to raise awareness of-and alter perceptions regarding-computer security.  ...  We analyze and report on feedback from 22 of these educators about their experiences using Control-Alt-Hack with over 450  ...  We thank everyone who playtested, provided feedback, or otherwise helped improve the game. We thank those who graciously lent us their names and biographic details: Deborah  ... 
doi:10.1145/2508859.2516753 dblp:conf/ccs/DenningLSK13 fatcat:6dvvkgd3cnfzrnxzaovoxqvffi

Artificial Intelligence and Game Theory Models for Defending Critical Networks with Cyber Deception

Managing Editor, Sunny Fugate, Kimberly Ferguson-Walter
2019 The AI Magazine  
Such techniques are likely to play a pivotal role in defending national and international security concerns.  ...  Finally, we discuss techniques for combining artificial intelligence algorithms with game theory models to estimate hidden states of the attacker using feedback through payoffs to learn how best to defend  ...  For repeated versions of the prisoner's dilemma, various strategy policies can be defined that take into account the entire history of prior plays.  ... 
doi:10.1609/aimag.v40i1.2849 fatcat:hm5pr7aagffc5ijtni2laks26u

Learning about Conflict and Negotiations through Computer Simulations: The Case of PeaceMaker

Esra Cuhadar, Ronit Kampf
2014 International Studies Perspectives  
Our purpose was to evaluate the game's effectiveness as a pedagogical tool in teaching about conflict and its resolution, especially with regard to generating knowledge acquisition, perspective taking  ...  Peace-Maker was used for educational and experimental purposes in a classroom setting and each student played the game in both Israeli and Palestinian decision maker roles.  ...  Game Effects on Knowledge Acquisition about the Conflict To examine the game effects on acquiring knowledge about the conflict, we conducted a repeated measures ANOVA with the number of correct answers  ... 
doi:10.1111/insp.12076 fatcat:quhd7d4bujgbpf4dtrlrlp4xze

Transparency, efficiency and the distribution of economic welfare in pass-through investment trust games

Thomas A. Rietz, Roman M. Sheremeta, Timothy W. Shields, Vernon L. Smith
2013 Journal of Economic Behavior and Organization  
In a repeated game, an investor invests via an intermediary who lends to a borrower. A pre-experiment one-shot version of the game serves as a baseline and to type each subject.  ...  We design an experiment to examine behavior and welfare in a multi-level trust game representing a pass through investment in an intermediated market.  ...  No subject participated more than once, and no subject had prior experience with a similar experimental environment.  ... 
doi:10.1016/j.jebo.2012.09.019 fatcat:hitxaf5ienbhbdptvoth6oxltm
« Previous Showing results 1 — 15 out of 73,280 results