To see the other types of publications on this topic, follow the link: Defensive game systems.

Journal articles on the topic 'Defensive game systems'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Defensive game systems.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Wu, Wenhao, and Bing Bu. "Security Analysis for CBTC Systems under Attack–Defense Confrontation." Electronics 8, no. 9 (2019): 991. http://dx.doi.org/10.3390/electronics8090991.

Full text
Abstract:
Communication-based train controls (CBTC) systems play a major role in urban rail transportation. As CBTC systems are no longer isolated from the outside world but use other networks to increase efficiency and improve productivity, they are exposed to huge cyber threats. This paper proposes a generalized stochastic Petri net (GSPN) model to capture dynamic interaction between the attacker and the defender to evaluate the security of CBTC systems. Depending on the characteristics of the system and attack–defense methods, we divided our model into two phases: penetration and disruption. In each
APA, Harvard, Vancouver, ISO, and other styles
2

Molik, Bartosz, Natalia Morgulec-Adamowicz, Jolanta Marszałek, et al. "Evaluation of Game Performance in Elite Male Sitting Volleyball Players." Adapted Physical Activity Quarterly 34, no. 2 (2017): 104–24. http://dx.doi.org/10.1123/apaq.2015-0028.

Full text
Abstract:
The aims of the current study were (a) to analyze the differences in game performances of sitting volleyball athletes representing the different types of disabilities and (b) to assess whether the seated position vertical reach is one of the crucial factors in the game performance level of sitting volleyball athletes. One hundred male athletes from various national teams participating in the European Championships in Sitting Volleyball (2009) took part in this study. The athletes were categorized according to type of disability and the results of the vertical reach in a seated position. Thirty
APA, Harvard, Vancouver, ISO, and other styles
3

Tian, Changjia, Varuna De Silva, Michael Caine, and Steve Swanson. "Use of Machine Learning to Automate the Identification of Basketball Strategies Using Whole Team Player Tracking Data." Applied Sciences 10, no. 1 (2019): 24. http://dx.doi.org/10.3390/app10010024.

Full text
Abstract:
The use of machine learning to identify and classify offensive and defensive strategies in team sports through spatio-temporal tracking data has received significant interest recently in the literature and the global sport industry. This paper focuses on data-driven defensive strategy learning in basketball. Most research to date on basketball strategy learning has focused on offensive effectiveness and is based on the interaction between the on-ball player and principle on-ball defender, thereby ignoring the contribution of the remaining players. Furthermore, most sports analytical systems th
APA, Harvard, Vancouver, ISO, and other styles
4

Gambarelli, Daniele, Gianfranco Gambarelli, and Dries Goossens. "Offensive or defensive play in soccer: a game-theoretical approach." Journal of Quantitative Analysis in Sports 15, no. 4 (2019): 261–69. http://dx.doi.org/10.1515/jqas-2017-0071.

Full text
Abstract:
Abstract In many sports, such as soccer, a coach has to decide whether to adopt an “offensive” or a “defensive” approach to a match. This strategic decision depends on the strengths and weaknesses of his team with respect to the opponent, but also on the strategy chosen by the opponent’s coach. The fact that a draw also results in a point, which may be important for the ranking, further complicates this decision, as the coach must assess whether it is better to adopt a defensive team formation in order to obtain a draw, or to aim for victory despite the increased risk of defeat. We study this
APA, Harvard, Vancouver, ISO, and other styles
5

Zhang, Cevin, Karin Pukk Härenstam, Sebastiaan Meijer, and Adam S. Darwich. "Serious Gaming of Logistics Management in Pediatric Emergency Medicine." International Journal of Serious Games 7, no. 1 (2020): 47–77. http://dx.doi.org/10.17083/ijsg.v7i1.334.

Full text
Abstract:
Access blocks throughout the entire healthcare system and overcrowding issues are pervasive in many emergency departments where the coordination and strategic management of resources could be supported by serious games and simulations approaches. However, existing studies have not addressed the reciprocal relation between patient inflow and working systems in serious games design in order to reflect the logistical features of an emergency department and to facilitate the players improve the work performance of the system. To address the issue, this paper presents a serious game based on a mult
APA, Harvard, Vancouver, ISO, and other styles
6

Pizarro, David, Alba Práxedes, Bruno Travassos, Bruno Gonçalves, and Alberto Moreno. "How Informational Constraints for Decision-Making on Passing, Dribbling and Shooting Change With the Manipulation of Small-Sided Games Changes in Futsal." Perceptual and Motor Skills 128, no. 4 (2021): 1684–711. http://dx.doi.org/10.1177/00315125211016350.

Full text
Abstract:
In this study, we explored how manipulating floaters’ positions in small-sided futsal games (SSGs) promote changes in the informational constraints that support decision-making (DM) for passing, dribbling and shooting tactics. We made changes in four experimental 3 vs 3 small-sided game conditions with 30 male futsal players (U19 age category): (a) Floaters Off (FO), (b) Final Line Floaters (FLF), (c) Lateral Floaters own field sideline (LFofsl) and (d) Lateral Floaters full field sideline (LFffsl). We assessed players’ activity with WIMU PRO™ software during the SSGs, using the Game Performan
APA, Harvard, Vancouver, ISO, and other styles
7

Guedea Delgado, Julio Cesar, Raúl Josué Nájera Longoria, Oscar Núñez Enríquez, Ramón Candía Luján, and Gabriel Gastélum Cuadras. "Sistemas tácticos y resultados de competición del Mundial de Fútbol Asociación de Rusia 2018.Tactical systems and matches results from the Football Association Worldcup Rusia 2018." Retos, no. 36 (June 6, 2019): 503–9. http://dx.doi.org/10.47197/retos.v36i36.69296.

Full text
Abstract:
Sistemas tácticos y resultados de competición del Mundial de Fútbol Asociación de Rusia 2018Tactical systems and match results from FIFA Worldcup Rusia 2018Julio Cesar Guedea Delgado, Raúl Josué Nájera Longoria, Oscar Núñez Enríquez, Ramón Candía Luján, Gabriel Gastélum CuadrasUniversidad Autónoma de Chihuahua (México) Resumen. Los sistemas tácticos dentro del fútbol soccer son elementales tanto a la ofensiva como a la defensiva. El presente estudio consiste en el analizar los sistemas tácticos y resultados de juego de Mundial de Rusia 2018. Se analizaron los 64 partidos, cuyos datos se extraj
APA, Harvard, Vancouver, ISO, and other styles
8

Praça, Gibson Moreira, Hugo Folgado, André Gustavo Pereira de Andrade, and Pablo Juan Greco. "Comportamento tático coletivo em Pequenos Jogos no Futebol: influência de jogadores adicionais." Brazilian Journal of Kinanthropometry and Human Performance 18, no. 1 (2016): 62. http://dx.doi.org/10.5007/1980-0037.2016v18n1p62.

Full text
Abstract:
DOI: http://dx.doi.org/10.5007/1980-0037.2016v18n1p62 The aim of this study was to compare the collective tactical behavior between numerically balanced and unbalanced small-sided soccer games. Eighteen male soccer players (mean age 16.4 years) participated in the study. Polar coordinate analysis was performed using positional data obtained with a 15-Hz GPS device. Collective variables including length, width, centroid distance (average point between teammates), and length per width ratio (LPWratio) were collected. Data were analyzed using Friedman’s test. The results showed greater length and
APA, Harvard, Vancouver, ISO, and other styles
9

Montgomery, Paul G., David B. Pyne, and Clare L. Minahan. "The Physical and Physiological Demands of Basketball Training and Competition." International Journal of Sports Physiology and Performance 5, no. 1 (2010): 75–86. http://dx.doi.org/10.1123/ijspp.5.1.75.

Full text
Abstract:
Purpose:To characterize the physical and physiological responses during different basketball practice drills and games.Methods:Male basketball players (n = 11; 19.1 ± 2.1 y, 1.91 ± 0.09 m, 87.9 ± 15.1 kg; mean ± SD) completed offensive and defensive practice drills, half court 5on5 scrimmage play, and competitive games. Heart rate, VO2 and triaxial accelerometer data (physical demand) were normalized for individual participation time. Data were log-transformed and differences between drills and games standardized for interpretation of magnitudes and reported with the effect size (ES) statistic
APA, Harvard, Vancouver, ISO, and other styles
10

Zhang, Jing, Shifei Shen, and Rui Yang. "The impacts of adaptive attacking and defending strategies on mitigation of intentional threats." Kybernetes 39, no. 5 (2010): 825–37. http://dx.doi.org/10.1108/03684921011043279.

Full text
Abstract:
PurposeThe purpose of this paper is to focus on resource allocation and information disclosure policy for defending multiple targets against intentional attacks. The intentional attacks, like terrorism events, probably cause great losses and fatalities. Attackers and defenders usually make decisions based on incomplete information. Adaptive attacking and defending strategies are considered, to study how both sides make more effective decisions according to previous fights.Design/methodology/approachA stochastic game‐theoretic approach is proposed for modeling attacker‐defender conflicts. Attac
APA, Harvard, Vancouver, ISO, and other styles
11

King, Sheila M., Caroline Dykeman, Peter Redgrave, and Paul Dean. "Use of a Distracting Task to Obtain Defensive Head Movements to Looming Visual Stimuli by Human Adults in a Laboratory Setting." Perception 21, no. 2 (1992): 245–59. http://dx.doi.org/10.1068/p210245.

Full text
Abstract:
Defensive responses to looming visual stimuli have been obtained in a wide variety of species, including human infants as young as one week. This phenomenon has not, however, been formally demonstrated for adults under laboratory conditions. In this paper it is reported that similar responses, namely avoidance movements of the head, can be obtained in most human adults provided that they are suitably distracted by playing a computer tracking game. Such behaviours were not obtained when subjects were not so distracted. The use of control conditions also ruled out the possibility that simple mov
APA, Harvard, Vancouver, ISO, and other styles
12

Xia, Zhuoqun, Zhenwei Fang, Fengfei Zou, Jin Wang, and Arun Kumar Sangaiah. "Research on Defensive Strategy of Real-Time Price Attack Based on Multiperson Zero-Determinant." Security and Communication Networks 2019 (July 16, 2019): 1–13. http://dx.doi.org/10.1155/2019/6956072.

Full text
Abstract:
The smart grid solves the growing load demand of electrical customers through two-way real-time communication of electricity supply and demand sides and home energy management system (HEMS). However, these technical features also bring network security risks to the real-time price signal of the smart grid. The real-time price attack (RTPA) can maliciously raise the real-time price in smart meter, resulting in an increase in electrical customers load demand, causing the extensive damage to the power transmission lines due to overload. In this paper, we based on the behavioral relationship betwe
APA, Harvard, Vancouver, ISO, and other styles
13

Shan, Xiaojun, and Jun Zhuang. "Hybrid defensive resource allocations in the face of partially strategic attackers in a sequential defender–attacker game." European Journal of Operational Research 228, no. 1 (2013): 262–72. http://dx.doi.org/10.1016/j.ejor.2013.01.029.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Odhiambo, Edwin, and Jane Wanjira. "Strategic Positioning and Competitive Advantage of Commercial Banks in Uasin Gishu County, Kenya." International Journal of Current Aspects 3, no. II (2019): 83–97. http://dx.doi.org/10.35942/ijcab.v3iii.8.

Full text
Abstract:
Strategic positioning has been identified as an important weapon to manage the competition in the business environment. However, despite the use of strategic positions, many banks in the country are facing challenges from the competition destabilizing the position they hold. Thus, the sole reason of the project was to establish how strategic positioning affects competitive advantage of banks in Uasin Gishu County Kenya. The specific objectives were; to examine the effects of mono-segment positioning, multi-segment positioning, standby positioning, adaptive positioning and defensive positioning
APA, Harvard, Vancouver, ISO, and other styles
15

Yang, Agnes, Young Jin Kwon, and Sang-Yong Tom Lee. "The impact of information sharing legislation on cybersecurity industry." Industrial Management & Data Systems 120, no. 9 (2020): 1777–94. http://dx.doi.org/10.1108/imds-10-2019-0536.

Full text
Abstract:
PurposeThe objective of this paper is to investigate how firms react to cybersecurity information sharing environment where government organizations disseminate cybersecurity threat information gathered by individual firms to the private entities. The overall impact of information sharing on firms' cybersecurity investment decision has only been game-theoretically explored, not giving practical implication. The authors therefore leverage the Cybersecurity Information Sharing Act of 2015 (CISA) to observe firms' attitudinal changes toward investing in cybersecurity.Design/methodology/approachTh
APA, Harvard, Vancouver, ISO, and other styles
16

Liu, Xiaohu, Hengwei Zhang, Yuchen Zhang, Lulu Shao, and Jihong Han. "Active Defense Strategy Selection Method Based on Two-Way Signaling Game." Security and Communication Networks 2019 (November 29, 2019): 1–14. http://dx.doi.org/10.1155/2019/1362964.

Full text
Abstract:
Most network security research studies based on signaling games assume that either the attacker or the defender is the sender of the signal and the other party is the receiver of the signal. The attack and defense process is commonly modeled and analyzed from the perspective of one-way signal transmission. Aiming at the reality of two-way signal transmission in network attack and defense confrontation, we propose a method of active defense strategy selection based on a two-way signaling game. In this paper, a two-way signaling game model is constructed to analyze the network attack and defense
APA, Harvard, Vancouver, ISO, and other styles
17

Yang, Yu, Bichen Che, Yang Zeng, Yang Cheng, and Chenyang Li. "MAIAD: A Multistage Asymmetric Information Attack and Defense Model Based on Evolutionary Game Theory." Symmetry 11, no. 2 (2019): 215. http://dx.doi.org/10.3390/sym11020215.

Full text
Abstract:
With the rapid development and widespread applications of Internet of Things (IoT) systems, the corresponding security issues are getting more and more serious. This paper proposes a multistage asymmetric information attack and defense model (MAIAD) for IoT systems. Under the premise of asymmetric information, MAIAD extends the single-stage game model with dynamic and evolutionary game theory. By quantifying the benefits for both the attack and defense, MAIAD can determine the optimal defense strategy for IoT systems. Simulation results show that the model can select the optimal security defen
APA, Harvard, Vancouver, ISO, and other styles
18

Stilman, Boris, Vladimir Yakhnis, and Oleg Umanskiy. "Linguistic Geometry: The Age of Maturity." Journal of Advanced Computational Intelligence and Intelligent Informatics 14, no. 6 (2010): 684–99. http://dx.doi.org/10.20965/jaciii.2010.p0684.

Full text
Abstract:
This paper describes the current status of research and applications of Linguistic Geometry (LG), a type of game theory scalable to the level of real life defense systems. LG is compared to conventional gaming approaches with respect to their applicability to real world problems. LG generates winning strategies for all sides in a conflict in real time by constructing them out of a limited set of blocks called zones. Several examples of zones are introduced. The paper describes the process of discovery of new zones essential for various types of military operations, which represent different cl
APA, Harvard, Vancouver, ISO, and other styles
19

Noor, Ahmed K. "Game Changers." Mechanical Engineering 136, no. 09 (2014): 30–35. http://dx.doi.org/10.1115/1.2014-sep-1.

Full text
Abstract:
This article discusses the recent development in “cognitive computing” technology. Unlike expert systems of the past, which required inflexible hard-coded expert rules, cognitive computers interpret unstructured data (sensory information, images, voices, and numbers), navigate through vast amounts of information, learn by experience, and participate in dialogues with humans using natural language to solve extremely complex problems. The U.S. Defense Advanced Research Projects Agency is funding a program called SyNAPSE (Systems of Neuromorphic Adaptive Plastic Scalable Electronics) to develop m
APA, Harvard, Vancouver, ISO, and other styles
20

Hu, Yongjin, Han Zhang, Yuanbo Guo, Tao Li, and Jun Ma. "A Novel Attack-and-Defense Signaling Game for Optimal Deceptive Defense Strategy Choice." Wireless Communications and Mobile Computing 2020 (October 12, 2020): 1–10. http://dx.doi.org/10.1155/2020/8850356.

Full text
Abstract:
Increasingly, more administrators (defenders) are using defense strategies with deception such as honeypots to improve the IoT network security in response to attacks. Using game theory, the signaling game is leveraged to describe the confrontation between attacks and defenses. However, the traditional approach focuses only on the defender; the analysis from the attacker side is ignored. Moreover, insufficient analysis has been conducted on the optimal defense strategy with deception when the model is established with the signaling game. In our work, the signaling game model is extended to a n
APA, Harvard, Vancouver, ISO, and other styles
21

Tan, Jing-lei, Heng-wei Zhang, Hong-qi Zhang, et al. "Optimal Timing Selection Approach to Moving Target Defense: A FlipIt Attack-Defense Game Model." Security and Communication Networks 2020 (June 9, 2020): 1–12. http://dx.doi.org/10.1155/2020/3151495.

Full text
Abstract:
The centralized control characteristics of software-defined networks (SDNs) make them susceptible to advanced persistent threats (APTs). Moving target defense, as an effective defense means, is constantly developing. It is difficult to effectively characterize an MTD attack and defense game with existing game models and effectively select the defense timing to balance SDN service quality and MTD decision-making benefits. From the hidden confrontation between the actual attack and defense sides, existing attack-defense scenarios are abstractly characterized and analyzed. Based on the APT attack
APA, Harvard, Vancouver, ISO, and other styles
22

Zhang, Yuchen, and Jing Liu. "Optimal Decision-Making Approach for Cyber Security Defense Using Game Theory and Intelligent Learning." Security and Communication Networks 2019 (December 23, 2019): 1–16. http://dx.doi.org/10.1155/2019/3038586.

Full text
Abstract:
Existing approaches of cyber attack-defense analysis based on stochastic game adopts the assumption of complete rationality, but in the actual cyber attack-defense, it is difficult for both sides of attacker and defender to meet the high requirement of complete rationality. For this aim, the influence of bounded rationality on attack-defense stochastic game is analyzed. We construct a stochastic game model. Aiming at the problem of state explosion when the number of network nodes increases, we design the attack-defense graph to compress the state space and extract network states and defense st
APA, Harvard, Vancouver, ISO, and other styles
23

Liu, Xiaohu, Hengwei Zhang, Yuchen Zhang, and Lulu Shao. "Optimal Network Defense Strategy Selection Method Based on Evolutionary Network Game." Security and Communication Networks 2020 (October 28, 2020): 1–11. http://dx.doi.org/10.1155/2020/5381495.

Full text
Abstract:
The basic hypothesis of evolutionary game theory is that the players in the game possess limited rationality. The interactive behavior of players can be described by a learning mechanism that has theoretical advantages in modeling the network security problem in a real society. The current network security evolutionary game model generally adopts a replicator dynamic learning mechanism and assumes that the interaction between players in the group conforms to the characteristics of uniform mixed distribution. However, in an actual network attack and defense scenario, the players in the game hav
APA, Harvard, Vancouver, ISO, and other styles
24

Xu, Xiaotong, Gaocai Wang, Jintian Hu, and Yuting Lu. "Study on Stochastic Differential Game Model in Network Attack and Defense." Security and Communication Networks 2020 (June 8, 2020): 1–15. http://dx.doi.org/10.1155/2020/3417039.

Full text
Abstract:
In recent years, evolutionary game theory has been gradually applied to analyze and predict network attack and defense for maintaining cybersecurity. The traditional deterministic game model cannot accurately describe the process of actual network attack and defense due to changing in the set of attack-defense strategies and external factors (such as the operating environment of the system). In this paper, we construct a stochastic evolutionary game model by the stochastic differential equation with Markov property. The evolutionary equilibrium solution of the model is found and the stability
APA, Harvard, Vancouver, ISO, and other styles
25

Liang, Li, Fang Deng, Zhihong Peng, Xinxing Li, and Wenzhong Zha. "A differential game for cooperative target defense." Automatica 102 (April 2019): 58–71. http://dx.doi.org/10.1016/j.automatica.2018.12.034.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Shi, Leyi, Xiran Wang, and Huiwen Hou. "Research on Optimization of Array Honeypot Defense Strategies Based on Evolutionary Game Theory." Mathematics 9, no. 8 (2021): 805. http://dx.doi.org/10.3390/math9080805.

Full text
Abstract:
Honeypot has been regarded as an active defense technology that can deceive attackers by simulating real systems. However, honeypot is actually a static network trap with fixed disposition, which is easily identified by anti-honeypot technology. Thus, honeypot is a “passive” active defense technology. Dynamic honeypot makes up for the shortcomings of honeypot, which dynamically adjusts defense strategies with the attack of hackers. Therefore, the confrontation between defenders and attackers is a strategic game. This paper focuses on the non-cooperative evolutionary game mechanism of bounded r
APA, Harvard, Vancouver, ISO, and other styles
27

Shinar, J., and G. Silberman. "A discrete dynamic game modelling anti-missile defense scenarios." Dynamics and Control 5, no. 1 (1995): 55–67. http://dx.doi.org/10.1007/bf01968535.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Von Moll, Alexander, and Zachariah Fuchs. "Attacker Dispersal Surface in the Turret Defense Differential Game." IFAC-PapersOnLine 53, no. 2 (2020): 15659–66. http://dx.doi.org/10.1016/j.ifacol.2020.12.2549.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

He, Fei, Jun Zhuang, and Nageswara S. V. Rao. "Discrete game-theoretic analysis of defense in correlated cyber-physical systems." Annals of Operations Research 294, no. 1-2 (2019): 741–67. http://dx.doi.org/10.1007/s10479-019-03381-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Mi, Yan, Hengwei Zhang, Hao Hu, Jinglei Tan, and Jindong Wang. "Optimal Network Defense Strategy Selection Method: A Stochastic Differential Game Model." Security and Communication Networks 2021 (August 21, 2021): 1–16. http://dx.doi.org/10.1155/2021/5594697.

Full text
Abstract:
In a real-world network confrontation process, attack and defense actions change rapidly and continuously. The network environment is complex and dynamically random. Therefore, attack and defense strategies are inevitably subject to random disturbances during their execution, and the transition of the network security state is affected accordingly. In this paper, we construct a network security state transition model by referring to the epidemic evolution process, use Gaussian noise to describe random effects during the strategy execution, and introduce a random disturbance intensity factor to
APA, Harvard, Vancouver, ISO, and other styles
31

Flores-Rodríguez, José, and Gonzalo Ramírez-Macías. "Pedagogía no lineal en balonmano. Defensa zonal de una y dos líneas en partidos reducidos (Non-linear pedagogy in handball. One and two lines zone defence in small-sided games)." Retos, no. 39 (September 7, 2020): 604–13. http://dx.doi.org/10.47197/retos.v0i39.79640.

Full text
Abstract:

 La pedagogía no lineal presenta diferencias importantes respecto a los modelos de enseñanza tradicionalmente empleados en balonmano. La ausencia de investigaciones sobre el proceso de enseñanza-aprendizaje en balonmano desde la pedagogía no lineal motivó el presente trabajo. El objetivo fue conocer la influencia ejercida por dos constreñimientos introducidos en una tarea: defensa zonal de una línea (LI1) y defensa zonal de dos líneas con defensor avanzado (LI2), en los comportamientos, ofensivos y defensivos, realizados por jugadores de balonmano. Estos constreñimientos, representativos
APA, Harvard, Vancouver, ISO, and other styles
32

Lins, Isis Didier, Paulo Renato Alves Firmino, Diogo de Carvalho Bezerra, et al. "DEFENSE-ATTACK INTERACTION OVER OPTIMALLY DESIGNED DEFENSE SYSTEMS VIA GAMES AND RELIABILITY." Pesquisa Operacional 34, no. 2 (2014): 215–35. http://dx.doi.org/10.1590/0101-7438.2014.034.02.0215.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Degterev, D. A., and E. A. Stepkin. "American Assistance to Israel: Origins, Structure, Dynamics." MGIMO Review of International Relations, no. 3(30) (June 28, 2013): 92–99. http://dx.doi.org/10.24833/2071-8160-2013-3-30-92-99.

Full text
Abstract:
This article provides an analysis of the U.S. foreign assistance to Israel. It shows the evolution, structure and key trends of aid flows in 1949-2012. Particular emphasis is placed on military assistance to Israel, aimed to provide Qualitative military edge (QME) of the country in the Middle East and to ensure regional stability. The game-theoretic analysis in particular the repeated games is applied in order to understand the mechanisms of the effect of U.S. military assistance to Middle Eastern countries. The basic directions of U.S. aid (development of missile defense systems in Israel and
APA, Harvard, Vancouver, ISO, and other styles
34

Hasan, Saqib, Abhishek Dubey, Gabor Karsai, and Xenofon Koutsoukos. "A game-theoretic approach for power systems defense against dynamic cyber-attacks." International Journal of Electrical Power & Energy Systems 115 (February 2020): 105432. http://dx.doi.org/10.1016/j.ijepes.2019.105432.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

HAUSKEN, KJELL. "GAME THEORETIC ANALYSIS OF TWO-PERIOD-DEPENDENT DEGRADED MULTISTATE RELIABILITY SYSTEMS." International Game Theory Review 13, no. 03 (2011): 247–67. http://dx.doi.org/10.1142/s0219198911002988.

Full text
Abstract:
A system of two components is analyzed as a two-period game. After period 1 the system can be fully operational, in two states of intermediate degradation, or fail. Analogously to changing failure rates in dependent systems analyzed with Markov analysis, unit costs of defense and attack, and contest intensities, change in period 2. As the values of the two intermediate states increase from zero which gives the series system, towards their maxima which gives the parallel system, the defender becomes more advantaged, and the attacker more disadvantaged. Simulations illustrate the players' effort
APA, Harvard, Vancouver, ISO, and other styles
36

Boudko, Svetlana, Peder Aursand, and Habtamu Abie. "Evolutionary Game for Confidentiality in IoT-Enabled Smart Grids." Information 11, no. 12 (2020): 582. http://dx.doi.org/10.3390/info11120582.

Full text
Abstract:
We applied evolutionary game theory to extend a resource constrained security game model for confidentiality attacks and defenses in an Advanced Metering Infrastructure (AMI), which is a component of IoT-enabled Smart Grids. The AMI is modeled as a tree structure where each node aggregates the information of its children before encrypting it and passing it on to its parent. As a part of the model, we developed a discretization scheme for solving the replicator equations. The aim of this work was to explore the space of possible behaviors of attackers and to develop a framework where the AMI no
APA, Harvard, Vancouver, ISO, and other styles
37

Xiao, Kaiming, Cheng Zhu, Junjie Xie, Yun Zhou, Xianqiang Zhu, and Weiming Zhang. "Dynamic Defense against Stealth Malware Propagation in Cyber-Physical Systems: A Game-Theoretical Framework." Entropy 22, no. 8 (2020): 894. http://dx.doi.org/10.3390/e22080894.

Full text
Abstract:
Stealth malware is a representative tool of advanced persistent threat (APT) attacks, which poses an increased threat to cyber-physical systems (CPS) today. Due to the use of stealthy and evasive techniques, stealth malwares usually render conventional heavy-weight countermeasures inapplicable. Light-weight countermeasures, on the other hand, can help retard the spread of stealth malwares, but the ensuing side effects might violate the primary safety requirement of CPS. Hence, defenders need to find a balance between the gain and loss of deploying light-weight countermeasures, which normally i
APA, Harvard, Vancouver, ISO, and other styles
38

Close, Kevin, and Audrey Amrein-Beardsley. "Learning from what doesn’t work in teacher evaluation." Phi Delta Kappan 100, no. 1 (2018): 15–19. http://dx.doi.org/10.1177/0031721718797115.

Full text
Abstract:
Recent lawsuits reveal common mistakes plaguing current teacher evaluation systems. Drawing on arguments in court documents for prominent cases, the authors find that evaluation systems using value-added measures (VAM) suffer from a) inconsistent and unreliable teacher ratings, b) bias toward and against teachers of certain types of students, c) easy opportunities for administrators to game the system, and d) a lack of transparency. They urge others to engage with these (and other) arguments to design better, more valid, more useful, and ultimately more defensible teacher evaluation systems.
APA, Harvard, Vancouver, ISO, and other styles
39

Wang, Kun, Miao Du, Dejun Yang, Chunsheng Zhu, Jian Shen, and Yan Zhang. "Game-Theory-Based Active Defense for Intrusion Detection in Cyber-Physical Embedded Systems." ACM Transactions on Embedded Computing Systems 16, no. 1 (2016): 1–21. http://dx.doi.org/10.1145/2886100.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Xiang, Yingmeng, and Lingfeng Wang. "A game-theoretic study of load redistribution attack and defense in power systems." Electric Power Systems Research 151 (October 2017): 12–25. http://dx.doi.org/10.1016/j.epsr.2017.05.020.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Coughlin, P. J. "Pure strategy equilibria in a class of systems defense games." International Journal of Game Theory 20, no. 3 (1992): 195–210. http://dx.doi.org/10.1007/bf01253775.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Li, Yapeng, Ye Deng, Yu Xiao, and Jun Wu. "Attack and Defense Strategies in Complex Networks Based on Game Theory." Journal of Systems Science and Complexity 32, no. 6 (2019): 1630–40. http://dx.doi.org/10.1007/s11424-019-7420-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Musman, Scott, and Andrew Turner. "A game theoretic approach to cyber security risk management." Journal of Defense Modeling and Simulation: Applications, Methodology, Technology 15, no. 2 (2017): 127–46. http://dx.doi.org/10.1177/1548512917699724.

Full text
Abstract:
This paper describes the Cyber Security Game (CSG). Cyber Security Game is a method that has been implemented in software that quantitatively identifies cyber security risks and uses this metric to determine the optimal employment of security methods for any given investment level. Cyber Security Game maximizes a system’s ability to operate in today’s contested cyber environment by minimizing its mission risk. The risk score is calculated by using a mission impact model to compute the consequences of cyber incidents and combining that with the likelihood that attacks will succeed. The likeliho
APA, Harvard, Vancouver, ISO, and other styles
44

Cărăbaş, Ionică. "Aspects regarding the pivot player tasks in the handball game." Timisoara Physical Education and Rehabilitation Journal 7, no. 13 (2014): 123–27. http://dx.doi.org/10.1515/tperj-2015-0021.

Full text
Abstract:
Abstract Evolution of the handball game has brought a different approach in terms of the pivot player game. Since the main task of delaying the lateral movement of defenders to create opportunities for the back players or receive the ball and score against defending 6:0, was reached to the much more varied tasks and responsibilities imposed by the much larger spaces offered by the new defense systems. Many of the game actions are based to the pivot player movements, finding an optimal solution to score by the back or wing player being the result of her screening and sliding. To achieve more ef
APA, Harvard, Vancouver, ISO, and other styles
45

Qi, Chao, Jiangxing Wu, Guozhen Cheng, Jianjian Ai, and Shuo Zhao. "Security Analysis of Dynamic SDN Architectures Based on Game Theory." Security and Communication Networks 2018 (2018): 1–10. http://dx.doi.org/10.1155/2018/4123736.

Full text
Abstract:
Security evaluation of SDN architectures is of critical importance to develop robust systems and address attacks. Focused on a novel-proposed dynamic SDN framework, a game-theoretic model is presented to analyze its security performance. This model can represent several kinds of players’ information, simulate approximate attack scenarios, and quantitatively estimate systems’ reliability. And we explore several typical game instances defined by system’s capability, players’ objects, and strategies. Experimental results illustrate that the system’s detection capability is not a decisive element
APA, Harvard, Vancouver, ISO, and other styles
46

Zhao, Jinxiong, Xun Zhang, Fuqiang Di, et al. "Exploring the Optimum Proactive Defense Strategy for the Power Systems from an Attack Perspective." Security and Communication Networks 2021 (February 12, 2021): 1–14. http://dx.doi.org/10.1155/2021/6699108.

Full text
Abstract:
Proactive defense is one of the most promising approaches to enhance cyber-security in the power systems, while how to balance its costs and benefits has not been fully studied. This paper proposes a novel method to model cyber adversarial behaviors as attackers contending for the defenders’ benefit based on the game theory. We firstly calculate the final benefit of the hackers and defenders in different states on the basis of the constructed models and then predict the possible attack behavior and evaluate the best defense strategy for the power systems. Based on a real power system subnet, w
APA, Harvard, Vancouver, ISO, and other styles
47

Wang, Kun, Li Yuan, Toshiaki Miyazaki, Yuanfang Chen, and Yan Zhang. "Jamming and Eavesdropping Defense in Green Cyber–Physical Transportation Systems Using a Stackelberg Game." IEEE Transactions on Industrial Informatics 14, no. 9 (2018): 4232–42. http://dx.doi.org/10.1109/tii.2018.2841033.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Kujawski, Edouard. "A Probabilistic Game-Theoretic Method to Assess Deterrence and Defense Benefits of Security Systems." Systems Engineering 19, no. 6 (2016): 549–66. http://dx.doi.org/10.1002/sys.21376.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Liu, Zhaoxi, and Lingfeng Wang. "FlipIt Game Model-Based Defense Strategy Against Cyberattacks on SCADA Systems Considering Insider Assistance." IEEE Transactions on Information Forensics and Security 16 (2021): 2791–804. http://dx.doi.org/10.1109/tifs.2021.3065504.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Mecheva, Teodora, and Nikolay Kakanakov. "Cybersecurity in Intelligent Transportation Systems." Computers 9, no. 4 (2020): 83. http://dx.doi.org/10.3390/computers9040083.

Full text
Abstract:
Intelligent Transportation Systems (ITS) are emerging field characterized by complex data model, dynamics and strict time requirements. Ensuring cybersecurity in ITS is a complex task on which the safety and efficiency of transportation depends. The imposition of standards for a comprehensive architecture, as well as specific security standards, is one of the key steps in the evolution of ITS. The article examines the general outlines of the ITS architecture and security issues. The main focus of security approaches is: configuration and initialization of the devices during manufacturing at pe
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!