We present the results of research of limiting adversarial budget in attack games, and, in particular, in the failure-free attack tree models presented by Buldas-Stepanenko in 2012 and improved in 2013 by Buldas and Lenin. In the previously presented models attacker’s budget was assumed to be unlimited. It is natural to assume that the adversarial budget is limited and such an assumption would allow us to model the adversarial decision making more close to the one that might happen in real life. We analyze three atomic cases – the single atomic case, the atomic AND, and the atomic OR. Even these elementary cases become quite complex, at the same time, limiting adversarial budget does not seem to provide any better or more precise results co...
Recent deployments of Stackelberg security games (SSG) have led to two competing approaches to handl...
The author grants HarveyMudd College the nonexclusive right to make this work available for noncomme...
The success of a security attack crucially depends on the resources available to an attacker: time, ...
We present the results of research of limiting adversarial budget in attack games, and, in particula...
We present the results of research of limiting adversarial budget in attack games, and, in particula...
Attack trees are a well-known formalism for quantitative analysis of cyber attacks consisting of mul...
Attack trees are a well-known formalism for quantitative analysis of cyber attacks consisting of mul...
Attack tree analysis is used to estimate different parameters of general security threats based on i...
We present a new fully adaptive computational model for attack trees that allows attackers to repeat...
Recent large scale terrorist attacks have raised interest in models for resource allocation against ...
Attackers ’ private information is one of the main issues in defensive resource allocation games in ...
Several competing human behavior models have been proposed to model and protect against boundedly ra...
Attack-defence trees are a powerful technique for formally evaluating attack-defence scenarios. They...
The AutoAttack (AA) has been the most reliable method to evaluate adversarial robustness when consid...
Today, information security in defender-attacker game models is getting more attention from the rese...
Recent deployments of Stackelberg security games (SSG) have led to two competing approaches to handl...
The author grants HarveyMudd College the nonexclusive right to make this work available for noncomme...
The success of a security attack crucially depends on the resources available to an attacker: time, ...
We present the results of research of limiting adversarial budget in attack games, and, in particula...
We present the results of research of limiting adversarial budget in attack games, and, in particula...
Attack trees are a well-known formalism for quantitative analysis of cyber attacks consisting of mul...
Attack trees are a well-known formalism for quantitative analysis of cyber attacks consisting of mul...
Attack tree analysis is used to estimate different parameters of general security threats based on i...
We present a new fully adaptive computational model for attack trees that allows attackers to repeat...
Recent large scale terrorist attacks have raised interest in models for resource allocation against ...
Attackers ’ private information is one of the main issues in defensive resource allocation games in ...
Several competing human behavior models have been proposed to model and protect against boundedly ra...
Attack-defence trees are a powerful technique for formally evaluating attack-defence scenarios. They...
The AutoAttack (AA) has been the most reliable method to evaluate adversarial robustness when consid...
Today, information security in defender-attacker game models is getting more attention from the rese...
Recent deployments of Stackelberg security games (SSG) have led to two competing approaches to handl...
The author grants HarveyMudd College the nonexclusive right to make this work available for noncomme...
The success of a security attack crucially depends on the resources available to an attacker: time, ...