Abstract—We consider surveillance problems to be a set of system-adversary interaction problems in which an adversary can be modeled as a rational (selfish) agent trying to maximize his utility. We feel that appropriate adversary modeling can provide deep insights into the system performance and also clues for opti-mizing the system’s performance against the adversary. Further, we propose that system designers should exploit the fact that they can impose certain restrictions on the intruders and the way they interact with the system. The system designers can analyze the scenario to determine conditions under which system outperforms the adversaries, and then suitably reengineer the environment under a “scenario engineering ” approach to hel...
Abstract Game-theoretic modeling of computer security views security attack scenarios as an optimiza...
The security systems built to secure the computer network systems have to addressdynamically changin...
Thesis: Ph. D., Massachusetts Institute of Technology, Department of Aeronautics and Astronautics, 2...
We consider surveillance problems to be a set of system- ad-versary interaction problems in which an...
Critical infrastructure protection becomes increasingly a major concern in governments and industrie...
A game-theoretic approach is presented, which claims to be a universal method for solving most probl...
The increased reliance on the Internet has made information and communication systems more vulnerabl...
A game-theoretic approach is presented, which claims to be a universal method for solving most probl...
2018-10-24Protecting an organization’s cyber assets from intrusions and breaches due to attacks by m...
Security Games have been widely adopted to model scenarios in which one player, the Defender, has to...
Abstract. Recently, there has been an increase in interest in applying game the-oretic approaches to...
This paper investigates the secrecy and reliability of a communication where the user is assisting a...
Abstract—In patrolling, an agent perceives portions of an environment to detect the presence of an i...
Entities of physical presence have always been susceptible to attacks. Entities of online presence a...
In patrolling, an agent perceives portions of an environment to detect the presence of an intruder. ...
Abstract Game-theoretic modeling of computer security views security attack scenarios as an optimiza...
The security systems built to secure the computer network systems have to addressdynamically changin...
Thesis: Ph. D., Massachusetts Institute of Technology, Department of Aeronautics and Astronautics, 2...
We consider surveillance problems to be a set of system- ad-versary interaction problems in which an...
Critical infrastructure protection becomes increasingly a major concern in governments and industrie...
A game-theoretic approach is presented, which claims to be a universal method for solving most probl...
The increased reliance on the Internet has made information and communication systems more vulnerabl...
A game-theoretic approach is presented, which claims to be a universal method for solving most probl...
2018-10-24Protecting an organization’s cyber assets from intrusions and breaches due to attacks by m...
Security Games have been widely adopted to model scenarios in which one player, the Defender, has to...
Abstract. Recently, there has been an increase in interest in applying game the-oretic approaches to...
This paper investigates the secrecy and reliability of a communication where the user is assisting a...
Abstract—In patrolling, an agent perceives portions of an environment to detect the presence of an i...
Entities of physical presence have always been susceptible to attacks. Entities of online presence a...
In patrolling, an agent perceives portions of an environment to detect the presence of an intruder. ...
Abstract Game-theoretic modeling of computer security views security attack scenarios as an optimiza...
The security systems built to secure the computer network systems have to addressdynamically changin...
Thesis: Ph. D., Massachusetts Institute of Technology, Department of Aeronautics and Astronautics, 2...