A survey on game-theoretic approaches for intrusion detection and response optimization

C Kiennert, Z Ismail, H Debar, J Leneutre - ACM Computing Surveys …, 2018 - dl.acm.org
Intrusion Detection Systems (IDS) are key components for securing critical infrastructures,
capable of detecting malicious activities on networks or hosts. However, the efficiency of an …

Patrolling security games: Definition and algorithms for solving large instances with single patroller and single intruder

N Basilico, N Gatti, F Amigoni - Artificial intelligence, 2012 - Elsevier
Security games are gaining significant interest in artificial intelligence. They are
characterized by two players (a defender and an attacker) and by a set of targets the …

[HTML][HTML] Adversarial patrolling with spatially uncertain alarm signals

N Basilico, G De Nittis, N Gatti - Artificial Intelligence, 2017 - Elsevier
When securing complex infrastructures or large environments, constant surveillance of every
area is not affordable. To cope with this issue, a common countermeasure is the usage of …

The mysteries of security games: Equilibrium computation becomes combinatorial algorithm design

H Xu - Proceedings of the 2016 ACM Conference on …, 2016 - dl.acm.org
The security game is a basic model for resource allocation in adversarial environments.
Here there are two players, a defender and an attacker. The defender wants to allocate her …

Optimal patrol scheduling of hazardous pipelines using game theory

A Rezazadeh, L Zhang, G Reniers, N Khakzad… - Process Safety and …, 2017 - Elsevier
An approach based on game theory is proposed to schedule security patrolling for a
pipeline system. The method proposes numbers of patrolling paths according to the risk of …

The role of inter-organizational information systems in maritime transport chains

R Elbert, H Pontow, A Benlian - Electronic Markets, 2017 - Springer
Most global supply chains rely on maritime transport chains. Due to various organizations
involved in these chains, an intensive coordination is needed. Therefore, timely, cost …

Randomized security patrolling for link flooding attack detection

X Ma, B An, M Zhao, X Luo, L Xue, Z Li… - … on Dependable and …, 2019 - ieeexplore.ieee.org
With the advancement of large-scale coordinated attacks, the adversary is shifting away from
traditional distributed denial of service (DDoS) attacks against servers to sophisticated …

On Stackelberg mixed strategies

V Conitzer - Synthese, 2016 - Springer
It is sometimes the case that one solution concept in game theory is equivalent to applying
another solution concept to a modified version of the game. In such cases, does it make …

Designing preferences, beliefs, and identities for artificial intelligence

V Conitzer - Proceedings of the AAAI Conference on Artificial …, 2019 - ojs.aaai.org
Research in artificial intelligence, as well as in economics and other related fields, generally
proceeds from the premise that each agent has a well-defined identity, well-defined …

Optimal personalized defense strategy against man-in-the-middle attack

X Li, S Li, J Hao, Z Feng, B An - … of the AAAI Conference on Artificial …, 2017 - ojs.aaai.org
Abstract The Man-In-The-Middle (MITM) attack is one of the most common attacks employed
in the network hacking. MITM attackers can successfully invoke attacks such as denial of …