2016
DOI: 10.1007/978-3-319-31323-8_16
|View full text |Cite
|
Sign up to set email alerts
|

Towards a Science of Security Games

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 23 publications
(10 citation statements)
references
References 22 publications
0
10
0
Order By: Relevance
“…Such explanation suggests that people may deliberately try to behave more randomly themselves when they play against an Adaptive strategy than when they play against other types of attackers. Intentional random behavior is difficult for humans to detect and perceive (e.g., Rapoport and Budescu, 1997 ), and many current defense strategies rely on randomization of defense resources based on game-theoretic results (Nguyen et al, 2016 ). To test for this explanation we used a common non-parametric test for randomness to measure independent and identically distributed (i.i.d) behavior: the Wald-Wolfowitz runs test.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…Such explanation suggests that people may deliberately try to behave more randomly themselves when they play against an Adaptive strategy than when they play against other types of attackers. Intentional random behavior is difficult for humans to detect and perceive (e.g., Rapoport and Budescu, 1997 ), and many current defense strategies rely on randomization of defense resources based on game-theoretic results (Nguyen et al, 2016 ). To test for this explanation we used a common non-parametric test for randomness to measure independent and identically distributed (i.i.d) behavior: the Wald-Wolfowitz runs test.…”
Section: Resultsmentioning
confidence: 99%
“…To build effective dynamic and adaptive defense algorithms we need to address at least two strong assumptions in the science of security games (Nguyen et al, 2016 ) and behavioral game theory more generally (Gonzalez et al, 2015 ): information certainty and human rationality. Current defense algorithms inspired by game theory assume that a defender has perfect information about the payoff matrix and the attacker's behaviors.…”
Section: Introductionmentioning
confidence: 99%
“…For example, defenders have limited resources but need to care for many defense spots (weak points) of their assets while attackers are able to successfully launch attacks if they can exploit at least one vulnerability of defenders' assets. For this reason, many computer and network security problems are formulated as unfair games between the attacker and the defender [28][29][30].…”
Section: Defense Strategy: Random Monitoringmentioning
confidence: 99%
“…One of the effective defense strategies is to assign defenders' limited small defense resources to large defense spots in random ways, so that attackers cannot figure out which spots will be monitored [29,30]. For example, in [30], a defender uses a random patrol strategy to capture attackers in many defense spots because the defender cannot patrol all patrol spots at the same time, and a fixed periodic patrol method can be easily avoided by attackers.…”
Section: Defense Strategy: Random Monitoringmentioning
confidence: 99%
“…More sophisticated defender algorithms can be tried. Game Theory concepts can be applied, specifically treating the problem as a Stackelberg Security Game [31]. Specifically, the allocation of actionblocking "attention resources" can benefit from this.…”
Section: F U T U R E W O R Kmentioning
confidence: 99%