Liu et al., 2021 - Google Patents
Locks, bombs and testing: the case of independent locksLiu et al., 2021
- Document ID
- 17530045542502756088
- Author
- Liu L
- Sonin I
- Publication year
- Publication venue
- Modern Trends in Controlled Stochastic Processes: Theory and Applications, V. III
External Links
Snippet
Abstract We present a Defense/Attack resource allocation model, where Defender has some number of “locks” to protect n vulnerable boxes (sites), and Attacker is trying to destroy these boxes, having m “bombs,” which can be placed into boxes. Similar models were studied in …
- 230000000875 corresponding 0 description 6
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30943—Information retrieval; Database structures therefor; File system structures therefor details of database functions independent of the retrieved data type
- G06F17/30946—Information retrieval; Database structures therefor; File system structures therefor details of database functions independent of the retrieved data type indexing structures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/46—Multiprogramming arrangements
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computer systems based on biological models
- G06N3/02—Computer systems based on biological models using neural network models
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computer systems utilising knowledge based models
- G06N5/04—Inference methods or devices
- G06N5/046—Forward inferencing, production systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6217—Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/10—Complex mathematical operations
- G06F17/18—Complex mathematical operations for evaluating statistical data, e.g. average values, frequency distributions, probability functions, regression analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Chen et al. | When machine learning meets blockchain: A decentralized, privacy-preserving and secure design | |
Scutari et al. | Distributed nonconvex constrained optimization over time-varying digraphs | |
Ren et al. | Attack allocation on remote state estimation in multi-systems: Structural results and asymptotic solution | |
Sandler et al. | Military expenditure trends for 1960–2014 and what they reveal | |
Liu et al. | Differentially private consensus algorithm for continuous-time heterogeneous multi-agent systems | |
CN108647414B (en) | Combat plan adaptability analysis method based on simulation experiment and storage medium | |
Zheng et al. | BDPL: A boundary differentially private layer against machine learning model extraction attacks | |
US11443221B2 (en) | Distributed incorruptible accordant management of nonlocal data fusion, unified scheduling and engage-ability | |
Liu et al. | A mechanism for recognizing and suppressing the emergent behavior of UAV swarm | |
Piriou et al. | Simulation of stochastic blockchain models | |
Wang et al. | Uncertain extensive game with application to resource allocation of national security | |
Golany et al. | A two-resource allocation algorithm with an application to large-scale zero-sum defensive games | |
Goncharov et al. | Simulation and evaluation of conflict interactions in information systems | |
Liu et al. | Locks, bombs and testing: the case of independent locks | |
Lichev et al. | On the modularity of 3‐regular random graphs and random graphs with given degree sequences | |
CN114143035B (en) | Anti-attack method, system, equipment and medium of knowledge graph recommendation system | |
Vasal | Stochastic stackelberg games | |
Pang et al. | Probability-guaranteed secure consensus control for time-varying stochastic multi-agent systems under mixed attacks | |
Kumar et al. | Secure unmanned aerial vehicle (uav) communication using blockchain technology | |
Kučera et al. | Regular strategies and strategy improvement: Efficient tools for solving large patrolling problems | |
Chen et al. | Necessary and sufficient fully separable criterion and entanglement of three-qubit Greenberger–Horne–Zeilinger diagonal states | |
Sonin | Blotto game with testing (The Locks, Bombs and Testing model) | |
CN115022067A (en) | Network security defense method and device under game-based asymmetric information | |
JEVTIĆ et al. | Probabilistic Framework For Loss Distribution Of Smart Contract Risk | |
Lin et al. | Sybil attacks detection for dynamic environment in federated learning |