Articles with "defender" as a keyword



Photo from wikipedia

Toward a Solution of the Active Target Defense Differential Game

Sign Up to like & get
recommendations!
Published in 2019 at "Dynamic Games and Applications"

DOI: 10.1007/s13235-018-0250-1

Abstract: A novel pursuit-evasion differential game involving three agents is considered. An Attacker missile is pursuing a Target aircraft. The Target aircraft is aided by a Defender missile launched by, say, the wingman, to intercept the… read more here.

Keywords: game; defender; target; solution ... See more keywords
Photo from wikipedia

Adversarial risks in the lab – An experimental study of framing-effects in attacker-defender games

Sign Up to like & get
recommendations!
Published in 2019 at "Safety Science"

DOI: 10.1016/j.ssci.2019.08.004

Abstract: Abstract We conducted an economic lab experiment to test for a two-player defender-attacker game the theoretical predictions and two variants of framing. We used framing to intensify the players’ perceived conflict of interests in the… read more here.

Keywords: defender; risks lab; lab experimental; attacker ... See more keywords
Photo from wikipedia

The participation of the defender and the actions of handball goalkeepers in the situation of throws from backcourt positions

Sign Up to like & get
recommendations!
Published in 2020 at "International Journal of Performance Analysis in Sport"

DOI: 10.1080/24748668.2020.1753966

Abstract: ABSTRACT The aim of the study was to analyse the actions handball goalkeepers in the situation of throws from the backcourt position from the second and first line according to the contact with the defender.… read more here.

Keywords: goalkeepers situation; defender; actions handball; situation throws ... See more keywords
Photo by charlesdeluvio from unsplash

Defender: A Low Overhead and Efficient Fault-Tolerant Mechanism for Reliable on-Chip Router

Sign Up to like & get
recommendations!
Published in 2019 at "IEEE Access"

DOI: 10.1109/access.2019.2944490

Abstract: The ever-shrinking size of a transistor has made Network on Chip (NoC) susceptible to faults. A single error in the NoC can disrupt the entire communication. In this paper, we introduce Defender, a fault-tolerant router… read more here.

Keywords: fault tolerant; router; chip; defender ... See more keywords
Photo from wikipedia

Deception technology based intrusion protection and detection mechanism for digital substations: A Game theoretical approach

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Access"

DOI: 10.1109/access.2023.3279504

Abstract: Securing substations from cyber attacks is essential to safeguard critical power infrastructure. However, digital substations that are based on the IEC-61850 standard have Generic Object Oriented Substation Events (GOOSE) messages and Sampled Value (SV) messages… read more here.

Keywords: protection; defender; detection; game ... See more keywords
Photo from wikipedia

Game-Theoretic Modeling of Cyber Deception Against Epidemic Botnets in Internet of Things

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Internet of Things Journal"

DOI: 10.1109/jiot.2021.3081751

Abstract: Practically, a botnet is spread over the Internet of Things (IoT) to ensure an attacker the control of a large number of devices. In this context, in which IoT users react to protect their devices… read more here.

Keywords: theoretic modeling; internet things; game theoretic; defender ... See more keywords
Photo from wikipedia

Defending a Target Area With a Slower Defender

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Control Systems Letters"

DOI: 10.1109/lcsys.2022.3215944

Abstract: The target defense game is an abstraction of the counter-UAV mission, where a defender intends to intercept an invading drone before it enters a target area. While most studies on target defense games assume the… read more here.

Keywords: target area; defending target; area slower; defender ... See more keywords
Photo by mluotio83 from unsplash

A Reconnaissance Penetration Game With Territorial-Constrained Defender

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Automatic Control"

DOI: 10.1109/tac.2022.3183034

Abstract: A reconnaissance penetration game is a classic target-attacker-defender game. In this game, a reconnaissance UAV (namely attacker) tries to avoid the defender and reconnoiter a target as close as possible, whereas a target tries to… read more here.

Keywords: penetration game; defender; game; reconnaissance ... See more keywords
Photo by chuttersnap from unsplash

Sequential Attacker–Defender Game on Complex Networks Considering the Cascading Failure Process

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Computational Social Systems"

DOI: 10.1109/tcss.2021.3099718

Abstract: Cascading failure is a ubiquitous phenomenon that can paralyze networked systems in a short time. Many traditional studies of cascading failures have been conducted from the perspective of either an attacker or a defender. In… read more here.

Keywords: attacker defender; defender; complex networks; defender game ... See more keywords
Photo from wikipedia

Study of Multiple Target Defense Differential Games Using Receding Horizon-Based Switching Strategies

Sign Up to like & get
recommendations!
Published in 2021 at "IEEE Transactions on Control Systems Technology"

DOI: 10.1109/tcst.2021.3104857

Abstract: In this article, we study a variation of the active target-attacker-defender (ATAD) differential game involving multiple targets, an attacker, and a defender. Our model allows for 1) a capability of the defender to switch roles… read more here.

Keywords: game; receding horizon; defender; target ... See more keywords
Photo by timtrad from unsplash

From TTP to IoC: Advanced Persistent Graphs for Threat Hunting

Sign Up to like & get
recommendations!
Published in 2021 at "IEEE Transactions on Network and Service Management"

DOI: 10.1109/tnsm.2021.3056999

Abstract: Defenders fighting against Advanced Persistent Threats need to discover the propagation area of an adversary as quickly as possible. This discovery takes place through a phase of an incident response operation called Threat Hunting, where… read more here.

Keywords: ttp ioc; threat; defender; threat hunting ... See more keywords