Empirical game-theoretic methods for adaptive cyber-defense
MP Wellman, TH Nguyen, and M Wright
in S Jajodia et al. (Eds.): Adversarial and Uncertain Reasoning for Adaptive Cyber Defense, LNCS 11830, pages 112–128, 2019.
Abstract
Game-theoretic applications in cyber-security are often restricted…
Probably almost-stable strategy profiles in simulation-based games
M Wright and MP Wellman
AAMAS-19 Workshop on Games, Agents and Incentives, May 2019.
Abstract
Empirical studies of strategic settings commonly model player interactions under supposed game-theoretic equilibrium behavior, to predict what…
Iterated Deep Reinforcement Learning in Games: History-Aware Training for Improved Stability
M Wright, Y Wang, and MP Wellman
Proceedings of the 20th ACM Conference on Economics and Computation, pages 617-636, June 2019.
Abstract
Deep reinforcement learning (RL) is a powerful method for generating policies in complex environments,…
Deception in Finitely Repeated Security Games
TH Nguyen, Y Wang, A Sinha, and MP Wellman
33rd AAAI Conference on Artificial Intelligence, Jan/Feb 2019.
Abstract
Allocating resources to defend targets from attack is often complicated by uncertainty about the attacker’s capabilities,…
A Learning and Masking Approach to Secure Learning
L Nguyen, S Wang, and A Sinha
Ninth Conference on Decision and Game Theory for Security, October 2018.
Abstract
Deep Neural Networks (DNNs) have been shown to be vulnerable against adversarial examples, which are data points cleverly constructed…
Stackelberg Security Games: Looking Beyond a Decade of Success
A Sinha, F Fang, B An, C Kiekintveld, and M Tambe
27th International Joint Conference on Artificial Intelligence, July 2018.
Abstract
The Stackelberg Security Game (SSG) model has been immensely influential in security research since it…
Multi-stage attack graph security games: Heuristic strategies, with empirical game-theoretic analysis
TH Nguyen, M Wright, MP Wellman, and S Singh
Security and Communication Networks, Article ID 2864873, 28 pages, 2018.
Extended version of a paper presented at the Fourth ACM Workshop on Moving Target Defense, Oct 2017.
Abstract
We study…
A Stackelberg game model for botnet data exfilitration
TH Nguyen, MP Wellman, and S Singh
8th Conference on Decision and Game Theory for Security (GameSec), pages 151–170, Oct 2017.
Abstract
Cyber-criminals can distribute malware to control computers on a networked system and leverage these…
Adversarial and Uncertain Reasoning for Adaptive Cyber Defense: Building the Scientific Foundation
G Cybenko, S Jajodia, MP Wellman, and P Liu
In: Prakash A., Shyamasundar R. (eds) Information Systems Security. ICISS 2014. Lecture Notes in Computer Science, vol 8880. Springer.
Abstract
Today’s cyber defenses are largely static. They…
SoK: Security and Privacy in Machine Learning
N Papernot, P McDaniel, A Sinha, and MP Wellman
Third IEEE European Symposium on Security and Privacy, April 2018.
Abstract
Advances in machine learning (ML) in recent years have enabled a dizzying array of applications such as data analytics,…