Decoding the Imitation Security Game: Handling Attacker Imitative Behavior Deception.
Thanh Hong NguyenNam VuAmulya YadavUy NguyenPublished in: ECAI (2020)
Keyphrases
- access control
- game theory
- computer games
- video games
- game theoretic
- security mechanisms
- security requirements
- incomplete information
- information security
- game playing
- security level
- security issues
- mental states
- statistical databases
- intrusion detection
- security analysis
- cyber security
- autonomous robots
- security measures
- information systems
- human behavior
- computational models
- reinforcement learning