Liu et al., 2021 - Google Patents

Locks, bombs and testing: the case of independent locks

Liu et al., 2021

Document ID
17530045542502756088
Author
Liu L
Sonin I
Publication year
Publication venue
Modern Trends in Controlled Stochastic Processes: Theory and Applications, V. III

External Links

Snippet

Abstract We present a Defense/Attack resource allocation model, where Defender has some number of “locks” to protect n vulnerable boxes (sites), and Attacker is trying to destroy these boxes, having m “bombs,” which can be placed into boxes. Similar models were studied in …
Continue reading at link.springer.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30943Information retrieval; Database structures therefor; File system structures therefor details of database functions independent of the retrieved data type
    • G06F17/30946Information retrieval; Database structures therefor; File system structures therefor details of database functions independent of the retrieved data type indexing structures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30286Information retrieval; Database structures therefor; File system structures therefor in structured data stores
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for programme control, e.g. control unit
    • G06F9/06Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
    • G06F9/46Multiprogramming arrangements
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computer systems based on biological models
    • G06N3/02Computer systems based on biological models using neural network models
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N5/00Computer systems utilising knowledge based models
    • G06N5/04Inference methods or devices
    • G06N5/046Forward inferencing, production systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6217Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/10Complex mathematical operations
    • G06F17/18Complex mathematical operations for evaluating statistical data, e.g. average values, frequency distributions, probability functions, regression analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems

Similar Documents

Publication Publication Date Title
Chen et al. When machine learning meets blockchain: A decentralized, privacy-preserving and secure design
Scutari et al. Distributed nonconvex constrained optimization over time-varying digraphs
Ren et al. Attack allocation on remote state estimation in multi-systems: Structural results and asymptotic solution
Sandler et al. Military expenditure trends for 1960–2014 and what they reveal
Liu et al. Differentially private consensus algorithm for continuous-time heterogeneous multi-agent systems
CN108647414B (en) Combat plan adaptability analysis method based on simulation experiment and storage medium
Zheng et al. BDPL: A boundary differentially private layer against machine learning model extraction attacks
US11443221B2 (en) Distributed incorruptible accordant management of nonlocal data fusion, unified scheduling and engage-ability
Liu et al. A mechanism for recognizing and suppressing the emergent behavior of UAV swarm
Piriou et al. Simulation of stochastic blockchain models
Wang et al. Uncertain extensive game with application to resource allocation of national security
Golany et al. A two-resource allocation algorithm with an application to large-scale zero-sum defensive games
Goncharov et al. Simulation and evaluation of conflict interactions in information systems
Liu et al. Locks, bombs and testing: the case of independent locks
Lichev et al. On the modularity of 3‐regular random graphs and random graphs with given degree sequences
CN114143035B (en) Anti-attack method, system, equipment and medium of knowledge graph recommendation system
Vasal Stochastic stackelberg games
Pang et al. Probability-guaranteed secure consensus control for time-varying stochastic multi-agent systems under mixed attacks
Kumar et al. Secure unmanned aerial vehicle (uav) communication using blockchain technology
Kučera et al. Regular strategies and strategy improvement: Efficient tools for solving large patrolling problems
Chen et al. Necessary and sufficient fully separable criterion and entanglement of three-qubit Greenberger–Horne–Zeilinger diagonal states
Sonin Blotto game with testing (The Locks, Bombs and Testing model)
CN115022067A (en) Network security defense method and device under game-based asymmetric information
JEVTIĆ et al. Probabilistic Framework For Loss Distribution Of Smart Contract Risk
Lin et al. Sybil attacks detection for dynamic environment in federated learning