Sign Up to like & get
recommendations!
1
Published in 2019 at "Dynamic Games and Applications"
DOI: 10.1007/s13235-018-0250-1
Abstract: A novel pursuit-evasion differential game involving three agents is considered. An Attacker missile is pursuing a Target aircraft. The Target aircraft is aided by a Defender missile launched by, say, the wingman, to intercept the…
read more here.
Keywords:
game;
defender;
target;
solution ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2019 at "Safety Science"
DOI: 10.1016/j.ssci.2019.08.004
Abstract: Abstract We conducted an economic lab experiment to test for a two-player defender-attacker game the theoretical predictions and two variants of framing. We used framing to intensify the players’ perceived conflict of interests in the…
read more here.
Keywords:
defender;
risks lab;
lab experimental;
attacker ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2019 at "Behavioral and Brain Sciences"
DOI: 10.1017/s0140525x19000694
Abstract: Abstract The target article focuses on how attacker-defender conflicts are fought. This commentary complements it by considering how attacker-defender conflicts may be resolved at the bargaining table. I highlight multiple linkages between asymmetric intergroup conflict…
read more here.
Keywords:
intergroup negotiation;
attacker defender;
defender conflicts;
attacker ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2024 at "Robotica"
DOI: 10.1017/s0263574724001632
Abstract: Abstract Multi-player pursuit-evasion games are crucial for addressing the maneuver decision problem arising in the cooperative control of multi-agent systems. This paper presents a cooperative defense strategy involving cooperation and confrontation among the target, attacker,…
read more here.
Keywords:
attacker;
target;
cooperative defense;
defender ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2024 at "IEEE Access"
DOI: 10.1109/access.2024.3493759
Abstract: The Network Time Protocol (NTP) is one of the oldest Internet protocols, in use by millions of devices today. It performs the important function of synchronizing a host’s system clock to that of an accurate…
read more here.
Keywords:
attacker;
time;
network time;
time protocol ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2017 at "IEEE Communications Letters"
DOI: 10.1109/lcomm.2017.2687439
Abstract: We assume that a buffer-aided transmitter communicates with a receiving node in the presence of an attacker. We investigate the impact of a radio-frequency energy-harvesting attacker that probabilistically operates as a jammer or an eavesdropper.…
read more here.
Keywords:
aided transmitter;
transmitter;
jamming eavesdropping;
attacker ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2021 at "IEEE Control Systems Letters"
DOI: 10.1109/lcsys.2020.3041799
Abstract: This letter proposes fixed-time convergent cooperative guidance strategy for target-defender team against the incoming threat of an attacker. The target lures the attacker on a collision course by nullifying its line-of-sight rate with respect to…
read more here.
Keywords:
salvo based;
time;
attacker;
cooperative salvo ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2025 at "IEEE Control Systems Letters"
DOI: 10.1109/lcsys.2025.3640192
Abstract: Reach-avoid games model scenarios where an attacker seeks to reach a target region that a defender aims to protect. The challenge compared to pursuit-evasion games is that a defender cannot simply capture an attacker, but…
read more here.
Keywords:
attacker;
reach;
avoid games;
grid world ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2021 at "IEEE Wireless Communications Letters"
DOI: 10.1109/lwc.2021.3069828
Abstract: The growing concern of secure communication becomes more challenging when encountering a hybrid Full-duplex (FD) attacker possessing the dual capability to perform eavesdropping and jamming simultaneously. To analyze secrecy outage performance in the presence of…
read more here.
Keywords:
full duplex;
hybrid full;
link;
attacker ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2017 at "IEEE Transactions on Automatic Control"
DOI: 10.1109/tac.2016.2562921
Abstract: This paper is motivated by the desire to develop optimal defensive control strategies that discourage an attacker from engaging in attack while simultaneously encouraging retreat. We develop a general, two-player, differential game in which one…
read more here.
Keywords:
game;
retreat;
retreat differential;
engage retreat ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Transactions on Automatic Control"
DOI: 10.1109/tac.2021.3102464
Abstract: In this article, we investigate the behavior of agents with bounded rationality, attacking a set of stochastic sensors measuring the state of a binary event. The coordination problem between the attackers is formulated as a…
read more here.
Keywords:
bounded rationality;
byzantine sensors;
sensors attacks;
attacker ... See more keywords