2013
DOI: 10.1016/j.ress.2013.05.004
|View full text |Cite
|
Sign up to set email alerts
|

A game-theory approach to configuration of detection software with decision errors

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
21
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
6
2

Relationship

1
7

Authors

Journals

citations
Cited by 18 publications
(21 citation statements)
references
References 25 publications
0
21
0
Order By: Relevance
“…The framework we consider is common to military weapon target engagements (Aviv & Kress, 1997;Kisi, 1976;Mastran & Thomas, 1973), shooting problems (Glazebrook & Washburn, 2004;Sato, 1997a), cybersecurity (Gao, Zhong, & Mei, 2013;Hu, Xu, Xu, & Zhao, 2017), attacker-defender games (Levitin & Hausken, 2012), and more broadly to stochastic sequential resource allocation (Sato, 1996(Sato, , 1997b. In sequential assignment problems of the kind considered herein, the decision rule usually takes the form, attack the target iff its value is no less than a certain threshold c, where the optimal c is to be determined.…”
Section: Prior Workmentioning
confidence: 99%
“…The framework we consider is common to military weapon target engagements (Aviv & Kress, 1997;Kisi, 1976;Mastran & Thomas, 1973), shooting problems (Glazebrook & Washburn, 2004;Sato, 1997a), cybersecurity (Gao, Zhong, & Mei, 2013;Hu, Xu, Xu, & Zhao, 2017), attacker-defender games (Levitin & Hausken, 2012), and more broadly to stochastic sequential resource allocation (Sato, 1996(Sato, , 1997b. In sequential assignment problems of the kind considered herein, the decision rule usually takes the form, attack the target iff its value is no less than a certain threshold c, where the optimal c is to be determined.…”
Section: Prior Workmentioning
confidence: 99%
“…Gao [12] designed a game theoretic model to configure software products and decision errors. Gao-hui [13] worked about depending corporate software developments to game theory.…”
Section: Theory Of Games In Software Engineering Literaturementioning
confidence: 99%
“…In this paper [10] Network puzzles are an elegant mechanism for mitigating the effects of undesirable network communication. This paper has described the design and implementation of a network layer puzzle protocol and algorithm that can be used to effectively slow down flooding attacks and port scanning activity [11]. The system allows for high-speed implementations in the fast path of modern network devices, can be elastic deployed, and is resistant against replay and spoofing attacks.…”
Section: Literature Reviewmentioning
confidence: 99%