Sciweavers

948 search results - page 9 / 190
» Making a Game of Network Security
Sort
View
GECCO
2007
Springer
201views Optimization» more  GECCO 2007»
14 years 2 months ago
Evolving explicit opponent models in game playing
Opponent models are necessary in games where the game state is only partially known to the player, since the player must infer the state of the game based on the opponent’s acti...
Alan J. Lockett, Charles L. Chen, Risto Miikkulain...
CSSE
2008
IEEE
14 years 3 months ago
A Markov Game Theory-Based Risk Assessment Model for Network Information System
—Risk assessment is a very important tool to acquire a present and future security status of the network information system. Many risk assessment approaches consider the present ...
Cui Xiaolin, Xiaobin Tan, Zhang Yong, Hongsheng Xi
CCS
2008
ACM
13 years 10 months ago
Revocation games in ephemeral networks
A frequently proposed solution to node misbehavior in mobile ad hoc networks is to use reputation systems. But in ephemeral networks - a new breed of mobile networks where contact...
Maxim Raya, Mohammad Hossein Manshaei, Márk...
CHI
2009
ACM
14 years 9 months ago
Lessons from brain age on persuasion for computer security
Users generally have difficulty understanding and managing computer security tasks. We examined Nintendo's Brain Age games for ways to help users remember more secure passwor...
Alain Forget, Sonia Chiasson, Robert Biddle
FUIN
2008
128views more  FUIN 2008»
13 years 8 months ago
Impact of Asynchrony on the Behavior of Rational Selfish Agents
The behavior of rational selfish agents has been classically studied in the framework of strategic games in which each player has a set of possible actions, players choose actions ...
David Ilcinkas, Andrzej Pelc