This dissertation presents efficient, on-line, convergent methods to find defense strategies against attacks in dynamic multi-stage attacker-defender games including adaptive learning. This effort culminated in four papers submitted to high quality journals and a book and they are partially published. The first paper presents a novel fictitious play approach to describe the interactions between the attackers and network administrator along a dynamic game. Multi-objective optimization methodology is used to predict the attacker's best actions at each decision node. The administrator also keeps track of the attacker's actions and updates his knowledge on the attacker's behavior and objectives after each detected attack, and uses this informat...
Most of the cybersecurity research focus on either presenting a specific vulnerability %or hacking t...
Title: Artificial intelligence for real-time strategic games Author: Ondřej Sýkora Department: Depar...
The unifying theme of this thesis is the design and analysis of adaptive procedures that are aimed a...
The interactions between attackers and network administrator are modeled as a non-cooperative non-ze...
The recent developments of advanced intrusion detection systems in the cyber security field provide ...
This work investigates an evolutionary approach to generate gaming strategies for the Attacker-Defen...
This work investigates an evolutionary approach to generate gaming strategies for the Attacker-Defen...
In the multistep attack scenario, each rational attack-defense player tries to maximize his payoff, ...
We propose interdependent defense (IDD) games, a computational game-theoretic framework to study asp...
We study the problem of allocating limited security countermeasures to protect network data from cyb...
Threat intervention with limited security resources is a chal-lenging problem. An optimal strategy i...
This paper focuses on cyber-security simulations in networks modeled as a Markov game with incomplet...
This paper focuses on cyber-security simulations in networks modeled as a Markov game with incomplet...
This paper focuses on cyber-security simulations in networks modeled as a Markov game with incomplet...
Abstract Game-theoretic modeling of computer security views security attack scenarios as an optimiza...
Most of the cybersecurity research focus on either presenting a specific vulnerability %or hacking t...
Title: Artificial intelligence for real-time strategic games Author: Ondřej Sýkora Department: Depar...
The unifying theme of this thesis is the design and analysis of adaptive procedures that are aimed a...
The interactions between attackers and network administrator are modeled as a non-cooperative non-ze...
The recent developments of advanced intrusion detection systems in the cyber security field provide ...
This work investigates an evolutionary approach to generate gaming strategies for the Attacker-Defen...
This work investigates an evolutionary approach to generate gaming strategies for the Attacker-Defen...
In the multistep attack scenario, each rational attack-defense player tries to maximize his payoff, ...
We propose interdependent defense (IDD) games, a computational game-theoretic framework to study asp...
We study the problem of allocating limited security countermeasures to protect network data from cyb...
Threat intervention with limited security resources is a chal-lenging problem. An optimal strategy i...
This paper focuses on cyber-security simulations in networks modeled as a Markov game with incomplet...
This paper focuses on cyber-security simulations in networks modeled as a Markov game with incomplet...
This paper focuses on cyber-security simulations in networks modeled as a Markov game with incomplet...
Abstract Game-theoretic modeling of computer security views security attack scenarios as an optimiza...
Most of the cybersecurity research focus on either presenting a specific vulnerability %or hacking t...
Title: Artificial intelligence for real-time strategic games Author: Ondřej Sýkora Department: Depar...
The unifying theme of this thesis is the design and analysis of adaptive procedures that are aimed a...