Search Results - "Kiekintveld, Christopher"
-
1
Improving resource allocation strategies against human adversaries in security games: An extended study
Published in Artificial intelligence (01-02-2013)“…Stackelberg games have garnered significant attention in recent years given their deployment for real world security. Most of these systems, such as ARMOR,…”
Get full text
Journal Article -
2
Generating Effective Patrol Strategies to Enhance U.S. Border Security
Published in Journal of strategic security (01-10-2013)Get full text
Journal Article -
3
Software Assistants for Randomized Patrol Planning for the LAX Airport Police and the Federal Air Marshal Service
Published in Interfaces (Providence) (01-07-2010)“…The increasing threat of terrorism makes security at major locations of economic or political importance a major concern. Limited security resources prevent…”
Get full text
Journal Article -
4
STRATEGIC INTERACTIONS IN A SUPPLY CHAIN GAME
Published in Computational intelligence (01-02-2005)“…The TAC 2003 supply‐chain game presented automated trading agents with a challenging strategic problem. Embedded within a high‐dimensional stochastic…”
Get full text
Journal Article -
5
Solving zero-sum one-sided partially observable stochastic games
Published in Artificial intelligence (01-03-2023)“…Many real-world situations are dynamic, with long-term interactions between multiple agents with uncertainty and limited observations. The agents must reason…”
Get full text
Journal Article -
6
A Systematic Approach for Temporal Traffic Selection Across Various Applications
Published in 2023 32nd International Conference on Computer Communications and Networks (ICCCN) (01-07-2023)“…The paper presents a framework that analyzes temporal traffic in applications, with a focus on statistical analysis and traffic classification. The framework…”
Get full text
Conference Proceeding -
7
Network discovery and scanning strategies and the Dark Triad
Published in Computers in human behavior (01-09-2021)“…Research examining cybercrime and personality is a critical, but understudied topic. From an applied perspective, such research will inform better practice in…”
Get full text
Journal Article -
8
Optimizing honeypot strategies against dynamic lateral movement using partially observable stochastic games
Published in Computers & security (01-11-2019)“…Partially observable stochastic games (POSGs) are a general game-theoretic model for capturing dynamic interactions where players have partial information. The…”
Get full text
Journal Article -
9
Case Studies of Network Defense with Attack Graph Games
Published in IEEE intelligent systems (01-09-2016)“…The increasing complexity of securing modern computer networks makes decision support systems an important tool for administrators. A challenge many existing…”
Get full text
Journal Article -
10
Hardening networks against strategic attackers using attack graph games
Published in Computers & security (01-11-2019)“…We consider the problem faced by a network administrator (defender) when deploying limited security resources to protect a network against a strategic…”
Get full text
Journal Article -
11
An Exact Double-Oracle Algorithm for Zero-Sum Extensive-Form Games with Imperfect Information
Published in The Journal of artificial intelligence research (01-01-2014)“…Developing scalable solution algorithms is one of the central problems in computational game theory. We present an iterative algorithm for computing an exact…”
Get full text
Journal Article -
12
Stackelberg vs. Nash in Security Games: An Extended Investigation of Interchangeability, Equivalence, and Uniqueness
Published in The Journal of artificial intelligence research (21-06-2011)“…There has been significant recent interest in game-theoretic approaches to security, with much of the recent research focused on utilizing the leader-follower…”
Get full text
Journal Article -
13
Honeypot Allocation for Cyber Deception Under Uncertainty
Published in IEEE eTransactions on network and service management (01-09-2022)“…Cyber deception aims to misrepresent the state of the network to mislead the attackers, falsify their reconnaissance conclusions, and deflect them away from…”
Get full text
Journal Article -
14
Local Context Normalization: Revisiting Local Normalization
Published in 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) (01-06-2020)“…Normalization layers have been shown to improve convergence in deep neural networks, and even add useful inductive biases. In many vision applications the…”
Get full text
Conference Proceeding -
15
The Dark Triad and strategic resource control in a competitive computer game
Published in Personality and individual differences (01-01-2021)“…Strategic resource control poses a trade-off to attackers and defenders. Actions that reclaim control of a resource pose costs, but control of a resource by an…”
Get full text
Journal Article -
16
On the Defense Against Adversarial Examples Beyond the Visible Spectrum
Published in MILCOM 2018 - 2018 IEEE Military Communications Conference (MILCOM) (01-10-2018)“…Machine learning (ML) models based on RGB images are vulnerable to adversarial attacks, representing a potential cyber threat to the user. Adversarial examples…”
Get full text
Conference Proceeding -
17
Leveraging Bayesian Multinomial Models for Effective Targeted Cyber-Deception Strategies
Published in 2024 19th Annual System of Systems Engineering Conference (SoSE) (23-06-2024)“…Cyber deception strategies play a vital role in fortifying computer networks and systems against malicious intrusions by misleading attackers. This study…”
Get full text
Conference Proceeding -
18
Enhancing IoT Device Security: Predicting and Analyzing Reconnaissance Attacks Using Flags and Time-Based Attributes
Published in 2023 10th International Conference on Internet of Things: Systems, Management and Security (IOTSMS) (23-10-2023)“…This study delves into the comprehensive analysis of reconnaissance attacks targeting IoT devices, leveraging time-based characteristics and flag attributes…”
Get full text
Conference Proceeding -
19
Performance Comparison and Implementation of Bayesian Variants for Network Intrusion Detection
Published in 2023 IEEE International Conference on Artificial Intelligence, Blockchain, and Internet of Things (AIBThings) (16-09-2023)“…Bayesian classifiers perform well when each of the features is completely independent of the other which is not always valid in real world application. The aim…”
Get full text
Conference Proceeding -
20
Optimizing Crop Recommendations for Sustainable Agriculture: Leveraging Bayesian Networks in a Smart Crop Recommendation System
Published in 2023 20th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON) (11-09-2023)“…Agriculture faces challenges in terms of productivity and sustainability, particularly in developing countries. This paper presents a smart crop recommendation…”
Get full text
Conference Proceeding