ExploitFlow, cyber security exploitation routes for Game Theory and AI research in robotics.
Víctor Mayoral VilchesGelei DengYi LiuMartin PinzgerStefan RassPublished in: CoRR (2023)
Keyphrases
- game theory
- cyber security
- artificial intelligence
- smart grid
- intrusion detection
- game theoretic
- cyber attacks
- cooperative
- nash equilibrium
- critical infrastructure
- resource allocation
- multi agent systems
- intrusion detection system
- statistical physics
- multi agent learning
- network security
- security issues
- fictitious play
- cooperative game theory
- nash equilibria
- data mining
- power system
- visual analytics
- mobile devices
- solution concepts
- computational intelligence
- intelligent agents