A game theory approach for the reallocation of security forces against terrorist diversionary attacks.
Yi-Ming ChenDachrahn WuCheng-Kuang WuPublished in: ISI (2009)
Keyphrases
- game theory
- security threats
- security problems
- security mechanisms
- security measures
- game theoretic
- computer security
- java card
- terrorist attacks
- security protocols
- cooperative
- countermeasures
- security risks
- nash equilibrium
- security vulnerabilities
- security issues
- information security
- denial of service attacks
- cyber attacks
- resource allocation
- chosen plaintext
- counter terrorism
- multi agent systems
- mechanism design
- security requirements
- network security
- biometric template
- terrorist groups
- statistical physics
- intrusion detection
- fictitious play
- nash equilibria
- cooperative game theory
- solution concepts
- multi agent learning
- cryptographic protocols
- computer science
- dos attacks
- financial crisis
- law enforcement
- human computation
- homeland security
- smart card
- information sharing
- decision theory
- boolean games
- imperfect information