In this dissertation we propose two novel non-zero-sum, adversarial detection games motivated by problems in network security. First we consider a local mean field, interdependent detection game between a network of defenders and a strategic attacker. Each defender chooses a detection threshold to test for the presence of a botnet infection, which can propagate between defenders if undetected. In order to avoid detection, the attacker balances stealth and aggression in his strategic utilization of the compromised network. We compare selfish, decentralized defenders to centrally planned defenders in order to examine the effects of network externalities on detection strategies. It is found that for fixed attack strategies, decentralized defe...
This work examines propagation of cyber-threats over networks under an adversarial formulation. Expl...
This paper proposes a game-theoretic approach to address the problem of optimal sensor placement for...
This work examines propagation of cyber-threats over networks under an adversarial formulation. Expl...
In this dissertation we propose two novel non-zero-sum, adversarial detection games motivated by pro...
In this paper, a game theoretical analysis method is presented to provide the optimal security detec...
Consider an information network with threats called attackers; each attacker uses a probability dist...
Together with the massive and rapid evolution of computer networks, there has been a surge of resear...
Abstract Defender-Attacker Stackelberg games are the foundations of tools deployed for computing opt...
Abstract. We consider a network security classification game in which a strategic defender decides w...
We propose interdependent defense (IDD) games, a computational game-theoretic framework to study asp...
This paper proposes a game-theoretic approach to address the problem of optimal sensor placement for...
This work examines propagation of cyber-threats over networks under an adversarial formulation. Expl...
This work examines propagation of cyber-threats over networks under an adversarial formulation. Expl...
This work examines propagation of cyber-threats over networks under an adversarial formulation. Expl...
This work examines propagation of cyber-threats over networks under an adversarial formulation. Expl...
This work examines propagation of cyber-threats over networks under an adversarial formulation. Expl...
This paper proposes a game-theoretic approach to address the problem of optimal sensor placement for...
This work examines propagation of cyber-threats over networks under an adversarial formulation. Expl...
In this dissertation we propose two novel non-zero-sum, adversarial detection games motivated by pro...
In this paper, a game theoretical analysis method is presented to provide the optimal security detec...
Consider an information network with threats called attackers; each attacker uses a probability dist...
Together with the massive and rapid evolution of computer networks, there has been a surge of resear...
Abstract Defender-Attacker Stackelberg games are the foundations of tools deployed for computing opt...
Abstract. We consider a network security classification game in which a strategic defender decides w...
We propose interdependent defense (IDD) games, a computational game-theoretic framework to study asp...
This paper proposes a game-theoretic approach to address the problem of optimal sensor placement for...
This work examines propagation of cyber-threats over networks under an adversarial formulation. Expl...
This work examines propagation of cyber-threats over networks under an adversarial formulation. Expl...
This work examines propagation of cyber-threats over networks under an adversarial formulation. Expl...
This work examines propagation of cyber-threats over networks under an adversarial formulation. Expl...
This work examines propagation of cyber-threats over networks under an adversarial formulation. Expl...
This paper proposes a game-theoretic approach to address the problem of optimal sensor placement for...
This work examines propagation of cyber-threats over networks under an adversarial formulation. Expl...