Articles with "attacker" as a keyword



Toward a Solution of the Active Target Defense Differential Game

Sign Up to like & get
recommendations!
Published in 2019 at "Dynamic Games and Applications"

DOI: 10.1007/s13235-018-0250-1

Abstract: A novel pursuit-evasion differential game involving three agents is considered. An Attacker missile is pursuing a Target aircraft. The Target aircraft is aided by a Defender missile launched by, say, the wingman, to intercept the… read more here.

Keywords: game; defender; target; solution ... See more keywords

Adversarial risks in the lab – An experimental study of framing-effects in attacker-defender games

Sign Up to like & get
recommendations!
Published in 2019 at "Safety Science"

DOI: 10.1016/j.ssci.2019.08.004

Abstract: Abstract We conducted an economic lab experiment to test for a two-player defender-attacker game the theoretical predictions and two variants of framing. We used framing to intensify the players’ perceived conflict of interests in the… read more here.

Keywords: defender; risks lab; lab experimental; attacker ... See more keywords

Resolving attacker-defender conflicts through intergroup negotiation

Sign Up to like & get
recommendations!
Published in 2019 at "Behavioral and Brain Sciences"

DOI: 10.1017/s0140525x19000694

Abstract: Abstract The target article focuses on how attacker-defender conflicts are fought. This commentary complements it by considering how attacker-defender conflicts may be resolved at the bargaining table. I highlight multiple linkages between asymmetric intergroup conflict… read more here.

Keywords: intergroup negotiation; attacker defender; defender conflicts; attacker ... See more keywords

Cooperative defense of a territorial-constrained target in a target-attacker-defender game

Sign Up to like & get
recommendations!
Published in 2024 at "Robotica"

DOI: 10.1017/s0263574724001632

Abstract: Abstract Multi-player pursuit-evasion games are crucial for addressing the maneuver decision problem arising in the cooperative control of multi-agent systems. This paper presents a cooperative defense strategy involving cooperation and confrontation among the target, attacker,… read more here.

Keywords: attacker; target; cooperative defense; defender ... See more keywords

Quantitative Risk Analysis of Network Time Protocol (NTP) Spoofing Attacks

Sign Up to like & get
recommendations!
Published in 2024 at "IEEE Access"

DOI: 10.1109/access.2024.3493759

Abstract: The Network Time Protocol (NTP) is one of the oldest Internet protocols, in use by millions of devices today. It performs the important function of synchronizing a host’s system clock to that of an accurate… read more here.

Keywords: attacker; time; network time; time protocol ... See more keywords

Probabilistic Jamming/Eavesdropping Attacks to Confuse a Buffer-Aided Transmitter–Receiver Pair

Sign Up to like & get
recommendations!
Published in 2017 at "IEEE Communications Letters"

DOI: 10.1109/lcomm.2017.2687439

Abstract: We assume that a buffer-aided transmitter communicates with a receiving node in the presence of an attacker. We investigate the impact of a radio-frequency energy-harvesting attacker that probabilistically operates as a jammer or an eavesdropper.… read more here.

Keywords: aided transmitter; transmitter; jamming eavesdropping; attacker ... See more keywords
Photo from wikipedia

Cooperative Salvo Based Active Aircraft Defense Using Impact Time Guidance

Sign Up to like & get
recommendations!
Published in 2021 at "IEEE Control Systems Letters"

DOI: 10.1109/lcsys.2020.3041799

Abstract: This letter proposes fixed-time convergent cooperative guidance strategy for target-defender team against the incoming threat of an attacker. The target lures the attacker on a collision course by nullifying its line-of-sight rate with respect to… read more here.

Keywords: salvo based; time; attacker; cooperative salvo ... See more keywords

Reach-Avoid Games in a Grid World

Sign Up to like & get
recommendations!
Published in 2025 at "IEEE Control Systems Letters"

DOI: 10.1109/lcsys.2025.3640192

Abstract: Reach-avoid games model scenarios where an attacker seeks to reach a target region that a defender aims to protect. The challenge compared to pursuit-evasion games is that a defender cannot simply capture an attacker, but… read more here.

Keywords: attacker; reach; avoid games; grid world ... See more keywords

Analyzing Secrecy Outage in Hybrid Full-Duplex Attack While Exploiting CSI of Legitimate Link

Sign Up to like & get
recommendations!
Published in 2021 at "IEEE Wireless Communications Letters"

DOI: 10.1109/lwc.2021.3069828

Abstract: The growing concern of secure communication becomes more challenging when encountering a hybrid Full-duplex (FD) attacker possessing the dual capability to perform eavesdropping and jamming simultaneously. To analyze secrecy outage performance in the presence of… read more here.

Keywords: full duplex; hybrid full; link; attacker ... See more keywords

Generalized Engage or Retreat Differential Game With Escort Regions

Sign Up to like & get
recommendations!
Published in 2017 at "IEEE Transactions on Automatic Control"

DOI: 10.1109/tac.2016.2562921

Abstract: This paper is motivated by the desire to develop optimal defensive control strategies that discourage an attacker from engaging in attack while simultaneously encouraging retreat. We develop a general, two-player, differential game in which one… read more here.

Keywords: game; retreat; retreat differential; engage retreat ... See more keywords

Bounded Rationality in Byzantine Sensors Under Attacks

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Automatic Control"

DOI: 10.1109/tac.2021.3102464

Abstract: In this article, we investigate the behavior of agents with bounded rationality, attacking a set of stochastic sensors measuring the state of a binary event. The coordination problem between the attackers is formulated as a… read more here.

Keywords: bounded rationality; byzantine sensors; sensors attacks; attacker ... See more keywords