Simulation of Attacker Defender Interaction in a Noisy Security Game.
Erick GalinkinEmmanouil PountourakisJohn CarterSpiros MancoridisPublished in: CoRR (2022)
Keyphrases
- game theory
- game theoretic
- multi agent simulation
- human computer interaction
- information security
- access control
- simulation model
- game playing
- simulation environment
- user interaction
- video games
- security policies
- attack scenarios
- computer games
- nash equilibrium
- educational games
- virtual characters
- countermeasures
- online game
- security measures
- key management
- leader follower
- mixed strategy
- information systems
- security requirements
- statistical databases
- noisy data
- monte carlo
- virtual world
- multi agent systems
- reinforcement learning