Zobrazeno 1 - 8
of 8
pro vyhledávání: '"Karel Durkota"'
Publikováno v:
IEEE Intelligent Systems. 31:24-30
The increasing complexity of securing modern computer networks makes decision support systems an important tool for administrators. A challenge many existing tools fail to address is that attackers react strategically to new security measures, adapti
Autor:
Karel Durkota, Francis P. Wilkin, Vincent L. Fish, Alan E. E. Rogers, Jonathan M. Marr, G. Holodak, Martina B. Arndt
Publikováno v:
EPJ Web of Conferences, Vol 200, p 02004 (2019)
Many undergraduate radio astronomy courses are unable to give a detailed treatment of aperture synthesis due to time constraints and limited math backgrounds of students. We have taken a laboratory-based approach to teaching radio interferometry usin
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::98fac2effd34b0c7a8d576a7e0edadf9
http://arxiv.org/abs/1807.03812
http://arxiv.org/abs/1807.03812
Autor:
Branislav Bošanský, Viliam Lisý, Tomáš Pevný, Karel Horák, Christopher Kiekintveld, Karel Durkota
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783319687100
GameSec
GameSec
We study the problem of detecting data exfiltration in computer networks. We focus on the performance of optimal defense strategies with respect to an attacker’s knowledge about typical network behavior and his ability to influence the standard tra
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::8aa719710207bc9b585b9b08a363c223
https://doi.org/10.1007/978-3-319-68711-7_10
https://doi.org/10.1007/978-3-319-68711-7_10
Publikováno v:
Computers & Security. 87:101578
We consider the problem faced by a network administrator (defender) when deploying limited security resources to protect a network against a strategic attacker. To evaluate the effectiveness of a defense strategy, one must consider possible counterat
Publikováno v:
Proceedings of the AAAI Conference on Artificial Intelligence. 30
Strong Stackelberg Equilibrium (SSE) is a fundamental solution concept in game theory in which one player commits to a strategy, while the other player observes this commitment and plays a best response. We present a new algorithm for computing SSE f
Publikováno v:
Transactions on Computational Collective Intelligence XX ISBN: 9783319275420
Coordinated sequential decision making of a team of cooperative agents is described by principles of multiagent planning. In this work, we extend the MA-Strips formalism with the notion of extensibility and reuse a well-known initiator–participants
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::c3d78261a4beb811ab8ae4d324c3cf4a
https://doi.org/10.1007/978-3-319-27543-7_6
https://doi.org/10.1007/978-3-319-27543-7_6
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783319255934
GameSec
GameSec
We study the problem of network security hardening, in which a network administrator decides what security measures to use to best improve the security of the network. Specifically, we focus on deploying decoy services or hosts called honeypots. We m
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::4ada483ec0d0196fe5279cb5204d7cb8
https://doi.org/10.1007/978-3-319-25594-1_13
https://doi.org/10.1007/978-3-319-25594-1_13
Publikováno v:
Scopus-Elsevier
ICAART (1)
ICAART (1)
Problems of domain-independent multiagent planning for cooperative agents in deterministic environments can be tackled by a well-known initiator--participants scheme from classical multiagent negotiation protocols. In this work, we use the approach t
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::08d54025a4317f8bae12cd4f6cceff39
http://www.scopus.com/inward/record.url?eid=2-s2.0-84902315285&partnerID=MN8TOARS
http://www.scopus.com/inward/record.url?eid=2-s2.0-84902315285&partnerID=MN8TOARS