Security Games have been widely adopted to model scenarios in which one player, the Defender, has to decide how to deploy her resources to minimize the loss that can be caused by an attack performed by another player, the Attacker, aiming at maximizing such loss. In the present paper, we focus on scenarios in which the Defender has lexicographic-like preferences on the targets, being primarily interested in defending the integrity of a subset of the targets and, only secondarily, to reduce the amount of the other damaged targets. Our central motivation for studying this problem comes from the need to reduce the impact of malicious flows in networks, that can be either physical, like cities, or virtual, e.g., social networks. In this work, w...
Consider an information network with threats called attackers; each attacker uses a probability dist...
In this dissertation we propose two novel non-zero-sum, adversarial detection games motivated by pro...
Abstract—Aspnes et al [2] introduced an innovative game for modeling the containment of the spread o...
Security Games have been widely adopted to model scenarios in which one player, the Defender, has to...
In network security hardening a network administrator may need to use limited resources (such as hon...
Consider a distributed information network with harmful procedures called attackers (e.g., viruses);...
We study the problem of allocating limited security countermeasures to protect network data from cyb...
Consider a network vulnerable to viral infection. The system security software can guarantee safety ...
The increased reliance on the Internet has made information and communication systems more vulnerabl...
Attacks on the Internet are characterized by several alarming trends: 1) increases in frequency; 2...
Consider a network vulnerable to viral infection, where the security software can guar-antee safety ...
Entities of physical presence have always been susceptible to attacks. Entities of online presence a...
A digital security breach, by which confidential information is leaked, does not only affect the age...
International audienceA digital security breach, by which confidential information is leaked, does n...
Many strategic actions carry a ‘contagious ’ component be-yond the immediate locale of the effort it...
Consider an information network with threats called attackers; each attacker uses a probability dist...
In this dissertation we propose two novel non-zero-sum, adversarial detection games motivated by pro...
Abstract—Aspnes et al [2] introduced an innovative game for modeling the containment of the spread o...
Security Games have been widely adopted to model scenarios in which one player, the Defender, has to...
In network security hardening a network administrator may need to use limited resources (such as hon...
Consider a distributed information network with harmful procedures called attackers (e.g., viruses);...
We study the problem of allocating limited security countermeasures to protect network data from cyb...
Consider a network vulnerable to viral infection. The system security software can guarantee safety ...
The increased reliance on the Internet has made information and communication systems more vulnerabl...
Attacks on the Internet are characterized by several alarming trends: 1) increases in frequency; 2...
Consider a network vulnerable to viral infection, where the security software can guar-antee safety ...
Entities of physical presence have always been susceptible to attacks. Entities of online presence a...
A digital security breach, by which confidential information is leaked, does not only affect the age...
International audienceA digital security breach, by which confidential information is leaked, does n...
Many strategic actions carry a ‘contagious ’ component be-yond the immediate locale of the effort it...
Consider an information network with threats called attackers; each attacker uses a probability dist...
In this dissertation we propose two novel non-zero-sum, adversarial detection games motivated by pro...
Abstract—Aspnes et al [2] introduced an innovative game for modeling the containment of the spread o...