A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Resilience of LTE eNode B against smart jammer in infinite-horizon asymmetric repeated zero-sum game
2020
Physical Communication
It has been shown in game-theoretic literature that security strategies provide optimal solution in zero-sum games and that both players' security strategies in an infinite-horizon asymmetric repeated ...
The simulation results show that smart jammer maintains its dominance at a long range of prior probability values by playing non-revealing and misleading strategies against the network for its long-term ...
Since, the prior is common knowledge, it alleviates eNode B from "learning" and full monitoring in a repeated game. ...
doi:10.1016/j.phycom.2019.100989
fatcat:7morvf5dobbfzmxfv4e6vrgava
Smart Jammer and LTE Network Strategies in An Infinite-Horizon Zero-Sum Repeated Game with Asymmetric and Incomplete Information
[article]
2019
arXiv
pre-print
The main purpose of this article is to construct efficient suboptimal strategies for both players that can be used to solve the above-mentioned infinite-horizon repeated game with asymmetric and incomplete ...
It has been shown in game-theoretic literature that security strategies provide optimal solution in zero-sum games. ...
Since, the prior is common knowledge, it alleviates eNode B from "learning" and full monitoring in a repeated game. ...
arXiv:1904.11184v1
fatcat:w3ieof6fdbfhfc2lffnr4wmvni
Learning to compete, coordinate, and cooperate in repeated games using reinforcement learning
2010
Machine Learning
We show that M-Qubed learns to make profitable compromises across a wide-range of repeated matrix games played with many kinds of learners. ...
Additionally, we show that, in two-player games, M-Qubed's average payoffs approach the value of the Nash bargaining solution in self play. ...
We chose this formulation to better deal with the need to play mixed strategies in repeated games. ...
doi:10.1007/s10994-010-5192-9
fatcat:2jpcbyx5zzaibppnotn5bw45pi
QFlip: An Adaptive Reinforcement Learning Strategy for the FlipIt Security Game
[article]
2019
arXiv
pre-print
Finally, we introduce a generalized QFlip strategy with composite state space that outperforms a Greedy strategy for several distributions including Periodic and Uniform, without prior knowledge of the ...
We prove theoretical results on the convergence of our new strategy against an opponent playing with a Periodic strategy. ...
Army Combat Capabilities Development Command Army Research Laboratory and was accomplished under Cooperative Agreement Number W911NF-13-2-0045 (ARL Cyber Security CRA). ...
arXiv:1906.11938v2
fatcat:qa2kmlnolrhztgrbiyry6k3nru
Jammer-Type Estimation in LTE With a Smart Jammer Repeated Game
2017
IEEE Transactions on Vehicular Technology
games with perfect monitoring. ...
The proposed mechanism helps the network resolve uncertainty about the state of nature (jammer type) so that it can compute a repeated-game strategy conditioned on its estimate. ...
However, most of the prior work on asymmetric zerosum repeated games revolves around the informed player's viewpoint. ...
doi:10.1109/tvt.2017.2672682
fatcat:oousfbe2jbdapnqhgorrntux6u
Playing Repeated Network Interdiction Games with Semi-Bandit Feedback
2017
Proceedings of the Twenty-Sixth International Joint Conference on Artificial Intelligence
We study repeated network interdiction games with no prior knowledge of the adversary and the environment, which can model many real world network security domains. ...
In particular, we model the repeated network interdiction game with no prior knowledge as an online linear optimization problem, for which a novel and efficient online learning algorithm, SBGA, is proposed ...
Conclusions This paper provides the first defender strategy in repeated network security domains with no prior knowledge of the adversarial behavior model and the environment. ...
doi:10.24963/ijcai.2017/515
dblp:conf/ijcai/GuoAT17
fatcat:mqgw27cttvdsngnsyzijgq2vy4
A Serious Game for Healthcare Industry: Information Security Awareness Training Program for Hospital Universiti Kebangsaan Malaysia
2018
International Journal of Advanced Computer Science and Applications
Serious games benefit learning as the games are fun to play and motivate learners to participate and interact with learning activities. ...
This paper aims to develop an information security awareness training program for the healthcare industry to ensure the appropriate protection of electronic health systems. ...
Serious Game Attribute Incremental Learning The targeted audience is general employees with basic knowledge of information security. ...
doi:10.14569/ijacsa.2018.090932
fatcat:ct32xwttlbeppgzrp2wusjlezq
Learning to Stand in the Other's Shoes
2012
Social science computer review
Results revealed an improvement in students' game scores and a reduction in the correlations between scores and religion, political affiliation, and game performance across games played. ...
Results suggest that the understanding of the conflict that is provided by the game simulation combined with practice may make it possible to reduce personal bias and learn to stand in another's shoes ...
The authors declared no potential conflicts of interest with respect to the research, authorship, and/or publication of this article. ...
doi:10.1177/0894439312453979
fatcat:4ibvgtz4jjayvfxb2pd5bnbvlm
Time and the Prisoner's Dilemma
[article]
2007
arXiv
pre-print
In addition, a variant of the repeated Prisoner's Dilemma game is suggested, in which players have the choice of opting out. ...
This paper examines the integration of computational complexity into game theoretic models. The example focused on is the Prisoner's Dilemma, repeated for a finite length of time. ...
Furthermore, they require vast amounts of prior knowledge about the different players in the population. ...
arXiv:cs/0701139v1
fatcat:mmrnw7lfffhcpb7jq2nw6ibqnm
Learning against multiple opponents
2006
Proceedings of the fifth international joint conference on Autonomous agents and multiagent systems - AAMAS '06
We also demonstrate that the algorithm for stationary strategies outperforms existing algorithms in tests spanning a wide variety of repeated games with more than two players. ...
We address the problem of learning in repeated n-player (as opposed to 2-player) general-sum games, paying particular attention to the rarely addressed situation in which there are a mixture of agents ...
Of particular concern is looking for ways to weaken the requirement of full prior knowledge about the payoffs of the game. ...
doi:10.1145/1160633.1160766
dblp:conf/atal/VuPS06
fatcat:673fxwfxwffn3myyo36q7ztuca
Learning against opponents with bounded memory
2005
International Joint Conference on Artificial Intelligence
We propose extending existing criteria to apply to a class of adaptive opponents with bounded memory. ...
show an algorithm that provably achieves an ǫ-best response against this richer class of opponents while simultaneously guaranteeing a minimum payoff against any opponent and performing well in self-play ...
Godfather was motivated by the folk theorem for repeated games and selects some outcome in the game matrix with greater payoff for each agent than their security values and plays its portion of the target ...
dblp:conf/ijcai/PowersS05
fatcat:ewf2ssdqn5g6ph5h4sl3g4kuvu
Control-Alt-Hack
2013
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security - CCS '13
We scoped, designed, produced, and evaluated the effectiveness of a recreational tabletop card game created to raise awareness of-and alter perceptions regarding-computer security. ...
We analyze and report on feedback from 22 of these educators about their experiences using Control-Alt-Hack with over 450 ...
We thank everyone who playtested, provided feedback, or otherwise helped improve the game. We thank those who graciously lent us their names and biographic details: Deborah ...
doi:10.1145/2508859.2516753
dblp:conf/ccs/DenningLSK13
fatcat:6dvvkgd3cnfzrnxzaovoxqvffi
Artificial Intelligence and Game Theory Models for Defending Critical Networks with Cyber Deception
2019
The AI Magazine
Such techniques are likely to play a pivotal role in defending national and international security concerns. ...
Finally, we discuss techniques for combining artificial intelligence algorithms with game theory models to estimate hidden states of the attacker using feedback through payoffs to learn how best to defend ...
For repeated versions of the prisoner's dilemma, various strategy policies can be defined that take into account the entire history of prior plays. ...
doi:10.1609/aimag.v40i1.2849
fatcat:hm5pr7aagffc5ijtni2laks26u
Learning about Conflict and Negotiations through Computer Simulations: The Case of PeaceMaker
2014
International Studies Perspectives
Our purpose was to evaluate the game's effectiveness as a pedagogical tool in teaching about conflict and its resolution, especially with regard to generating knowledge acquisition, perspective taking ...
Peace-Maker was used for educational and experimental purposes in a classroom setting and each student played the game in both Israeli and Palestinian decision maker roles. ...
Game Effects on Knowledge Acquisition about the Conflict To examine the game effects on acquiring knowledge about the conflict, we conducted a repeated measures ANOVA with the number of correct answers ...
doi:10.1111/insp.12076
fatcat:quhd7d4bujgbpf4dtrlrlp4xze
Transparency, efficiency and the distribution of economic welfare in pass-through investment trust games
2013
Journal of Economic Behavior and Organization
In a repeated game, an investor invests via an intermediary who lends to a borrower. A pre-experiment one-shot version of the game serves as a baseline and to type each subject. ...
We design an experiment to examine behavior and welfare in a multi-level trust game representing a pass through investment in an intermediated market. ...
No subject participated more than once, and no subject had prior experience with a similar experimental environment. ...
doi:10.1016/j.jebo.2012.09.019
fatcat:hitxaf5ienbhbdptvoth6oxltm
« Previous
Showing results 1 — 15 out of 73,280 results