Articles with "attacker" as a keyword



Photo from wikipedia

Toward a Solution of the Active Target Defense Differential Game

Sign Up to like & get
recommendations!
Published in 2019 at "Dynamic Games and Applications"

DOI: 10.1007/s13235-018-0250-1

Abstract: A novel pursuit-evasion differential game involving three agents is considered. An Attacker missile is pursuing a Target aircraft. The Target aircraft is aided by a Defender missile launched by, say, the wingman, to intercept the… read more here.

Keywords: game; defender; target; solution ... See more keywords
Photo from wikipedia

Adversarial risks in the lab – An experimental study of framing-effects in attacker-defender games

Sign Up to like & get
recommendations!
Published in 2019 at "Safety Science"

DOI: 10.1016/j.ssci.2019.08.004

Abstract: Abstract We conducted an economic lab experiment to test for a two-player defender-attacker game the theoretical predictions and two variants of framing. We used framing to intensify the players’ perceived conflict of interests in the… read more here.

Keywords: defender; risks lab; lab experimental; attacker ... See more keywords
Photo from wikipedia

Resolving attacker-defender conflicts through intergroup negotiation

Sign Up to like & get
recommendations!
Published in 2019 at "Behavioral and Brain Sciences"

DOI: 10.1017/s0140525x19000694

Abstract: Abstract The target article focuses on how attacker-defender conflicts are fought. This commentary complements it by considering how attacker-defender conflicts may be resolved at the bargaining table. I highlight multiple linkages between asymmetric intergroup conflict… read more here.

Keywords: intergroup negotiation; attacker defender; defender conflicts; attacker ... See more keywords
Photo by bhurnal from unsplash

Probabilistic Jamming/Eavesdropping Attacks to Confuse a Buffer-Aided Transmitter–Receiver Pair

Sign Up to like & get
recommendations!
Published in 2017 at "IEEE Communications Letters"

DOI: 10.1109/lcomm.2017.2687439

Abstract: We assume that a buffer-aided transmitter communicates with a receiving node in the presence of an attacker. We investigate the impact of a radio-frequency energy-harvesting attacker that probabilistically operates as a jammer or an eavesdropper.… read more here.

Keywords: aided transmitter; transmitter; jamming eavesdropping; attacker ... See more keywords
Photo from wikipedia

Cooperative Salvo Based Active Aircraft Defense Using Impact Time Guidance

Sign Up to like & get
recommendations!
Published in 2021 at "IEEE Control Systems Letters"

DOI: 10.1109/lcsys.2020.3041799

Abstract: This letter proposes fixed-time convergent cooperative guidance strategy for target-defender team against the incoming threat of an attacker. The target lures the attacker on a collision course by nullifying its line-of-sight rate with respect to… read more here.

Keywords: salvo based; time; attacker; cooperative salvo ... See more keywords
Photo by jma245 from unsplash

Analyzing Secrecy Outage in Hybrid Full-Duplex Attack While Exploiting CSI of Legitimate Link

Sign Up to like & get
recommendations!
Published in 2021 at "IEEE Wireless Communications Letters"

DOI: 10.1109/lwc.2021.3069828

Abstract: The growing concern of secure communication becomes more challenging when encountering a hybrid Full-duplex (FD) attacker possessing the dual capability to perform eavesdropping and jamming simultaneously. To analyze secrecy outage performance in the presence of… read more here.

Keywords: full duplex; hybrid full; link; attacker ... See more keywords
Photo by mluotio83 from unsplash

Generalized Engage or Retreat Differential Game With Escort Regions

Sign Up to like & get
recommendations!
Published in 2017 at "IEEE Transactions on Automatic Control"

DOI: 10.1109/tac.2016.2562921

Abstract: This paper is motivated by the desire to develop optimal defensive control strategies that discourage an attacker from engaging in attack while simultaneously encouraging retreat. We develop a general, two-player, differential game in which one… read more here.

Keywords: game; retreat; retreat differential; engage retreat ... See more keywords
Photo by selcukss from unsplash

Bounded Rationality in Byzantine Sensors Under Attacks

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Automatic Control"

DOI: 10.1109/tac.2021.3102464

Abstract: In this article, we investigate the behavior of agents with bounded rationality, attacking a set of stochastic sensors measuring the state of a binary event. The coordination problem between the attackers is formulated as a… read more here.

Keywords: bounded rationality; byzantine sensors; sensors attacks; attacker ... See more keywords
Photo from wikipedia

Synthesis of the Supremal Covert Attacker Against Unknown Supervisors by Using Observations

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Automatic Control"

DOI: 10.1109/tac.2022.3191393

Abstract: In this article, we consider the problem of synthesizing the supremal covert damage-reachable attacker, in the setup where the model of the supervisor is unknown to the adversary but the adversary has recorded a (prefix-closed)… read more here.

Keywords: supremal covert; synthesis supremal; covert attacker; attacker ... See more keywords
Photo from wikipedia

Reach-Avoid Games With Two Defenders and One Attacker: An Analytical Approach

Sign Up to like & get
recommendations!
Published in 2019 at "IEEE Transactions on Cybernetics"

DOI: 10.1109/tcyb.2018.2794769

Abstract: This paper considers a reach-avoid game on a rectangular domain with two defenders and one attacker. The attacker aims to reach a specified edge of the game domain boundary, while the defenders strive to prevent… read more here.

Keywords: attacker; avoid games; defenders one; two defenders ... See more keywords
Photo by actuallyjoel from unsplash

A POMDP Approach to the Dynamic Defense of Large-Scale Cyber Networks

Sign Up to like & get
recommendations!
Published in 2018 at "IEEE Transactions on Information Forensics and Security"

DOI: 10.1109/tifs.2018.2819967

Abstract: We investigate the problem of optimally mitigating the progression of an adversary through a network in real-time, decreasing the probability of it reaching its goal(s), while minimizing the negative impact to availability. Our model is… read more here.

Keywords: defense; pomdp approach; attacker progression; security ... See more keywords