Countering attacker data manipulation in security games
. Defending against attackers with unknown behavior is an important area of research in security games. A well-established approach is to utilize historical attack data to create a behavioral model of the attacker. However, this presents a vulnerability: a clever attacker may change its own behavior...
Saved in:
Main Authors: | BUTLER, Andrew R., NGUYEN, Thanh H., SINHA, Arunesh |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2021
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/6564 https://ink.library.smu.edu.sg/context/sis_research/article/7567/viewcontent/Addressing_Partial_Adversarial_Deception_GameSec_1_.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
Similar Items
-
Learning adversary behavior in security games: A PAC model perspective
by: SINHA, Arunesh, et al.
Published: (2016) -
Three strategies to success: Learning adversary models in security games
by: HAGHTALAB, Nika, et al.
Published: (2016) -
Using abstractions to solve opportunistic crime security games at scale
by: ZHANG, Chao, et al.
Published: (2016) -
Don’t bury your head in warnings: A game-theoretic approach for intelligent allocation of cyber-security alerts
by: SCHLENKER, Aaron, et al.
Published: (2017) -
Towards a science of security games
by: NGUYEN, Thanh Hong, et al.
Published: (2016)