Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2019 at "Dynamic Games and Applications"
DOI: 10.1007/s13235-018-0250-1
Abstract: A novel pursuit-evasion differential game involving three agents is considered. An Attacker missile is pursuing a Target aircraft. The Target aircraft is aided by a Defender missile launched by, say, the wingman, to intercept the…
read more here.
Keywords:
game;
defender;
target;
solution ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2019 at "Safety Science"
DOI: 10.1016/j.ssci.2019.08.004
Abstract: Abstract We conducted an economic lab experiment to test for a two-player defender-attacker game the theoretical predictions and two variants of framing. We used framing to intensify the players’ perceived conflict of interests in the…
read more here.
Keywords:
defender;
risks lab;
lab experimental;
attacker ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2020 at "International Journal of Performance Analysis in Sport"
DOI: 10.1080/24748668.2020.1753966
Abstract: ABSTRACT The aim of the study was to analyse the actions handball goalkeepers in the situation of throws from the backcourt position from the second and first line according to the contact with the defender.…
read more here.
Keywords:
goalkeepers situation;
defender;
actions handball;
situation throws ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2019 at "IEEE Access"
DOI: 10.1109/access.2019.2944490
Abstract: The ever-shrinking size of a transistor has made Network on Chip (NoC) susceptible to faults. A single error in the NoC can disrupt the entire communication. In this paper, we introduce Defender, a fault-tolerant router…
read more here.
Keywords:
fault tolerant;
router;
chip;
defender ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
2
Published in 2023 at "IEEE Access"
DOI: 10.1109/access.2023.3279504
Abstract: Securing substations from cyber attacks is essential to safeguard critical power infrastructure. However, digital substations that are based on the IEC-61850 standard have Generic Object Oriented Substation Events (GOOSE) messages and Sampled Value (SV) messages…
read more here.
Keywords:
protection;
defender;
detection;
game ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Internet of Things Journal"
DOI: 10.1109/jiot.2021.3081751
Abstract: Practically, a botnet is spread over the Internet of Things (IoT) to ensure an attacker the control of a large number of devices. In this context, in which IoT users react to protect their devices…
read more here.
Keywords:
theoretic modeling;
internet things;
game theoretic;
defender ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
3
Published in 2023 at "IEEE Control Systems Letters"
DOI: 10.1109/lcsys.2022.3215944
Abstract: The target defense game is an abstraction of the counter-UAV mission, where a defender intends to intercept an invading drone before it enters a target area. While most studies on target defense games assume the…
read more here.
Keywords:
target area;
defending target;
area slower;
defender ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Transactions on Automatic Control"
DOI: 10.1109/tac.2022.3183034
Abstract: A reconnaissance penetration game is a classic target-attacker-defender game. In this game, a reconnaissance UAV (namely attacker) tries to avoid the defender and reconnoiter a target as close as possible, whereas a target tries to…
read more here.
Keywords:
penetration game;
defender;
game;
reconnaissance ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Transactions on Computational Social Systems"
DOI: 10.1109/tcss.2021.3099718
Abstract: Cascading failure is a ubiquitous phenomenon that can paralyze networked systems in a short time. Many traditional studies of cascading failures have been conducted from the perspective of either an attacker or a defender. In…
read more here.
Keywords:
attacker defender;
defender;
complex networks;
defender game ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2021 at "IEEE Transactions on Control Systems Technology"
DOI: 10.1109/tcst.2021.3104857
Abstract: In this article, we study a variation of the active target-attacker-defender (ATAD) differential game involving multiple targets, an attacker, and a defender. Our model allows for 1) a capability of the defender to switch roles…
read more here.
Keywords:
game;
receding horizon;
defender;
target ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2021 at "IEEE Transactions on Network and Service Management"
DOI: 10.1109/tnsm.2021.3056999
Abstract: Defenders fighting against Advanced Persistent Threats need to discover the propagation area of an adversary as quickly as possible. This discovery takes place through a phase of an incident response operation called Threat Hunting, where…
read more here.
Keywords:
ttp ioc;
threat;
defender;
threat hunting ... See more keywords