Empirical game-theoretic methods for adaptive cyber-defense

MP Wellman, TH Nguyen, and M Wright in S Jajodia et al. (Eds.): Adversarial and Uncertain Reasoning for Adaptive Cyber Defense, LNCS 11830, pages 112–128, 2019. Abstract Game-theoretic applications in cyber-security are often restricted…

Probably almost-stable strategy profiles in simulation-based games

M Wright and MP Wellman AAMAS-19 Workshop on Games, Agents and Incentives, May 2019. Abstract Empirical studies of strategic settings commonly model player interactions under supposed game-theoretic equilibrium behavior, to predict what…

Iterated Deep Reinforcement Learning in Games: History-Aware Training for Improved Stability

M Wright, Y Wang, and MP Wellman Proceedings of the 20th ACM Conference on Economics and Computation, pages 617-636, June 2019. Abstract Deep reinforcement learning (RL) is a powerful method for generating policies in complex environments,…

Deception in Finitely Repeated Security Games

TH Nguyen, Y Wang, A Sinha, and MP Wellman 33rd AAAI Conference on Artificial Intelligence, Jan/Feb 2019. Abstract Allocating resources to defend targets from attack is often complicated by uncertainty about the attacker’s capabilities,…

A Learning and Masking Approach to Secure Learning

L Nguyen, S Wang, and A Sinha Ninth Conference on Decision and Game Theory for Security, October 2018. Abstract Deep Neural Networks (DNNs) have been shown to be vulnerable against adversarial examples, which are data points cleverly constructed…

Stackelberg Security Games: Looking Beyond a Decade of Success

A Sinha, F Fang, B An, C Kiekintveld, and M Tambe 27th International Joint Conference on Artificial Intelligence, July 2018. Abstract The Stackelberg Security Game (SSG) model has been immensely influential in security research since it…

Multi-stage attack graph security games: Heuristic strategies, with empirical game-theoretic analysis

TH Nguyen, M Wright, MP Wellman, and S Singh Security and Communication Networks, Article ID 2864873, 28 pages, 2018. Extended version of a paper presented at the Fourth ACM Workshop on Moving Target Defense, Oct 2017. Abstract We study…

A Stackelberg game model for botnet data exfilitration

TH Nguyen, MP Wellman, and S Singh 8th Conference on Decision and Game Theory for Security (GameSec), pages 151–170, Oct 2017. Abstract Cyber-criminals can distribute malware to control computers on a networked system and leverage these…

Adversarial and Uncertain Reasoning for Adaptive Cyber Defense: Building the Scientific Foundation

G Cybenko, S Jajodia, MP Wellman, and P Liu In: Prakash A., Shyamasundar R. (eds) Information Systems Security. ICISS 2014. Lecture Notes in Computer Science, vol 8880. Springer. Abstract Today’s cyber defenses are largely static. They…

SoK: Security and Privacy in Machine Learning

N Papernot, P McDaniel, A Sinha, and MP Wellman Third IEEE European Symposium on Security and Privacy, April 2018. Abstract Advances in machine learning (ML) in recent years have enabled a dizzying array of applications such as data analytics,…