2012
DOI: 10.1007/978-3-642-34266-0_8
|View full text |Cite
|
Sign up to set email alerts
|

Simulation and Game-Theoretic Analysis of an Attacker-Defender Game

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(11 citation statements)
references
References 18 publications
0
11
0
Order By: Relevance
“…Then these inputs and submitted 6 to the KMS appropriately by the GCU 7 . The information is analyzed and attack/attacks is/are identified using attack identification system.…”
Section: Operational Flowmentioning
confidence: 99%
See 3 more Smart Citations
“…Then these inputs and submitted 6 to the KMS appropriately by the GCU 7 . The information is analyzed and attack/attacks is/are identified using attack identification system.…”
Section: Operational Flowmentioning
confidence: 99%
“…Not only different attacks warrant for different games to be played with different appropriate game models, different scenarios with same kind of attack may need different game models with 6 The GIDA Action Agent uses the first lookup table for this. 7 A typical example for this would be when two different sensors detect slight anomalies, but individual neither large enough to warrant a standard reflex action, as per sensor/actuator policies.…”
Section: Game Model Repositorymentioning
confidence: 99%
See 2 more Smart Citations
“…In a transportation setting, path-planning against adversaries was formulated as a distributed resource allocation problem and a linear-programming solution was proposed [8]. Finally, agent-based simulations are used in [9] to determine Nash equilibrium strategies in a network security game where both attacker and defender are subject to cost constraints.…”
Section: Introductionmentioning
confidence: 99%