The evolution of interactions between individuals or organizations are a central theme of complexity research. We aim at modeling a dynamic game on a network where an attacker and a defender compete in disrupting and reconnecting a network. The choices of how to attack and defend the network are governed by a Genetic Algorithm (GA) which is used to dynamically choose among a set of available strategies. Our analysis shows that the choice of strategy is particularly important if the resources available to the defender are slightly higher than the attackers'. The best strategies found through GAs by the attackers and defenders are based on betweenness centrality. Our results agree with previous literature assessing strategies for network atta...
Most of the cybersecurity research focus on either presenting a specific vulnerability %or hacking t...
Evolutionary game theory is widely applied in network attack and defense. The existing network attac...
This dissertation presents research that focuses on efficient allocation of defense resources to min...
The evolution of interactions between individuals or organizations are a central theme of complexity...
The evolution of interactions between individuals or organizations are a central theme of complexity...
Often an attacker tries to disconnect a network by destroying nodes or edges, while the defender cou...
This paper analyzes the optimal strategies for an attacker and a defender in an attack-defense game ...
Modern life is getting more complicated and people rely more on the intelligence embedded in their e...
We analyze the distributed network attack-defense game scenarios, and we find that attackers and def...
Maintaining the security of critical infrastructure networks is vital for a modern economy. This pap...
Successful military operations are increasingly reliant upon an advanced understanding of relevant n...
The basic hypothesis of evolutionary game theory is that the players in the game possess limited rat...
Successful attacks on computer networks today do not often owe their victory to directly overcoming ...
Connections between individuals facilitate the exchange of goods, resources and information and crea...
Finding optimal adversarial dynamics between defenders and attackers in large network systems is a c...
Most of the cybersecurity research focus on either presenting a specific vulnerability %or hacking t...
Evolutionary game theory is widely applied in network attack and defense. The existing network attac...
This dissertation presents research that focuses on efficient allocation of defense resources to min...
The evolution of interactions between individuals or organizations are a central theme of complexity...
The evolution of interactions between individuals or organizations are a central theme of complexity...
Often an attacker tries to disconnect a network by destroying nodes or edges, while the defender cou...
This paper analyzes the optimal strategies for an attacker and a defender in an attack-defense game ...
Modern life is getting more complicated and people rely more on the intelligence embedded in their e...
We analyze the distributed network attack-defense game scenarios, and we find that attackers and def...
Maintaining the security of critical infrastructure networks is vital for a modern economy. This pap...
Successful military operations are increasingly reliant upon an advanced understanding of relevant n...
The basic hypothesis of evolutionary game theory is that the players in the game possess limited rat...
Successful attacks on computer networks today do not often owe their victory to directly overcoming ...
Connections between individuals facilitate the exchange of goods, resources and information and crea...
Finding optimal adversarial dynamics between defenders and attackers in large network systems is a c...
Most of the cybersecurity research focus on either presenting a specific vulnerability %or hacking t...
Evolutionary game theory is widely applied in network attack and defense. The existing network attac...
This dissertation presents research that focuses on efficient allocation of defense resources to min...