Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2019 at "Dynamic Games and Applications"
DOI: 10.1007/s13235-018-0250-1
Abstract: A novel pursuit-evasion differential game involving three agents is considered. An Attacker missile is pursuing a Target aircraft. The Target aircraft is aided by a Defender missile launched by, say, the wingman, to intercept the…
read more here.
Keywords:
game;
defender;
target;
solution ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2019 at "Safety Science"
DOI: 10.1016/j.ssci.2019.08.004
Abstract: Abstract We conducted an economic lab experiment to test for a two-player defender-attacker game the theoretical predictions and two variants of framing. We used framing to intensify the players’ perceived conflict of interests in the…
read more here.
Keywords:
defender;
risks lab;
lab experimental;
attacker ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2019 at "Behavioral and Brain Sciences"
DOI: 10.1017/s0140525x19000694
Abstract: Abstract The target article focuses on how attacker-defender conflicts are fought. This commentary complements it by considering how attacker-defender conflicts may be resolved at the bargaining table. I highlight multiple linkages between asymmetric intergroup conflict…
read more here.
Keywords:
intergroup negotiation;
attacker defender;
defender conflicts;
attacker ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2017 at "IEEE Communications Letters"
DOI: 10.1109/lcomm.2017.2687439
Abstract: We assume that a buffer-aided transmitter communicates with a receiving node in the presence of an attacker. We investigate the impact of a radio-frequency energy-harvesting attacker that probabilistically operates as a jammer or an eavesdropper.…
read more here.
Keywords:
aided transmitter;
transmitter;
jamming eavesdropping;
attacker ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2021 at "IEEE Control Systems Letters"
DOI: 10.1109/lcsys.2020.3041799
Abstract: This letter proposes fixed-time convergent cooperative guidance strategy for target-defender team against the incoming threat of an attacker. The target lures the attacker on a collision course by nullifying its line-of-sight rate with respect to…
read more here.
Keywords:
salvo based;
time;
attacker;
cooperative salvo ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2021 at "IEEE Wireless Communications Letters"
DOI: 10.1109/lwc.2021.3069828
Abstract: The growing concern of secure communication becomes more challenging when encountering a hybrid Full-duplex (FD) attacker possessing the dual capability to perform eavesdropping and jamming simultaneously. To analyze secrecy outage performance in the presence of…
read more here.
Keywords:
full duplex;
hybrid full;
link;
attacker ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2017 at "IEEE Transactions on Automatic Control"
DOI: 10.1109/tac.2016.2562921
Abstract: This paper is motivated by the desire to develop optimal defensive control strategies that discourage an attacker from engaging in attack while simultaneously encouraging retreat. We develop a general, two-player, differential game in which one…
read more here.
Keywords:
game;
retreat;
retreat differential;
engage retreat ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Transactions on Automatic Control"
DOI: 10.1109/tac.2021.3102464
Abstract: In this article, we investigate the behavior of agents with bounded rationality, attacking a set of stochastic sensors measuring the state of a binary event. The coordination problem between the attackers is formulated as a…
read more here.
Keywords:
bounded rationality;
byzantine sensors;
sensors attacks;
attacker ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
2
Published in 2022 at "IEEE Transactions on Automatic Control"
DOI: 10.1109/tac.2022.3191393
Abstract: In this article, we consider the problem of synthesizing the supremal covert damage-reachable attacker, in the setup where the model of the supervisor is unknown to the adversary but the adversary has recorded a (prefix-closed)…
read more here.
Keywords:
supremal covert;
synthesis supremal;
covert attacker;
attacker ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2019 at "IEEE Transactions on Cybernetics"
DOI: 10.1109/tcyb.2018.2794769
Abstract: This paper considers a reach-avoid game on a rectangular domain with two defenders and one attacker. The attacker aims to reach a specified edge of the game domain boundary, while the defenders strive to prevent…
read more here.
Keywords:
attacker;
avoid games;
defenders one;
two defenders ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2018 at "IEEE Transactions on Information Forensics and Security"
DOI: 10.1109/tifs.2018.2819967
Abstract: We investigate the problem of optimally mitigating the progression of an adversary through a network in real-time, decreasing the probability of it reaching its goal(s), while minimizing the negative impact to availability. Our model is…
read more here.
Keywords:
defense;
pomdp approach;
attacker progression;
security ... See more keywords