The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Defender with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1976-2004 (20) 2005-2007 (21) 2008 (22) 2009-2012 (15) 2013-2014 (16) 2015 (18) 2016-2017 (17) 2018-2019 (25) 2020-2021 (48) 2022 (35) 2023 (22) 2024 (7)
Publication types (Num. hits)
article(120) data(1) incollection(1) inproceedings(142) phdthesis(2)
Venues (Conferences, Journals, ...)
CoRR(32) Reliab. Eng. Syst. Saf.(9) CDC(7) ACC(5) Eur. J. Oper. Res.(5) AAAI(4) IJCAI(4) Ann. Oper. Res.(3) GameSec(3) RoboCup(3) AAMAS(2) ARES(2) CCS(2) CollaborateCom(2) DSN(2) Dyn. Games Appl.(2) More (+10 of total 180)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 62 occurrences of 52 keywords

Results
Found 266 publication records. Showing 266 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
114Zonghua Zhang, Farid Naït-Abdesselam, Pin-Han Ho Boosting Markov Reward Models for Probabilistic Security Evaluation by Characterizing Behaviors of Attacker and Defender. Search on Bibsonomy ARES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Network security, anomaly detection, security evaluation, Markov Reward Models
114Marina Gelastou, Marios Mavronicolas, Vicky G. Papadopoulou, Anna Philippou, Paul G. Spirakis The Power of the Defender. Search on Bibsonomy ICDCS Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
83Marios Mavronicolas, Vicky Papadopoulou, Anna Philippou, Paul G. Spirakis A Network Game with Attackers and a Defender. Search on Bibsonomy Algorithmica The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Attacks and defenses, Security, Game theory, Graph theory, Nash equilibria
63Wei Sun, Xiangwei Kong, Dequan He, Xingang You Information Security Game Analysis with Penalty Parameter. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
63Rui Guo, Guiran Chang, Yuhai Qin, Baojing Sun, Yifu Feng, Dan Peng Research on Active Defense Strategy of Counter DDoS Attacks Based on Differential Games Model. Search on Bibsonomy WKDD The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
63Dan Peng, Guiran Chang, Rui Guo, Yuhai Qin DG-Based DDoS Detection Using Hybrid Strategy. Search on Bibsonomy FSKD (5) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
63Rui Guo, Guiran Chang, Yuhai Qin, Baojing Sun, An Liu, Bencheng Zhang, Dan Peng DG-Based Active Defense Strategy to Defend against DDoS. Search on Bibsonomy MUE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Active defense, Nash Equilibrium, DDoS, Differential Games
63Guido Boella, Leendert W. N. van der Torre Norm Governed Multiagent Systems: The Delegation of Control to Autonomous Agents. Search on Bibsonomy IAT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
52Jin-yi Cai, Vinod Yegneswaran, Chris Alfeld, Paul Barford An Attacker-Defender Game for Honeynets. Search on Bibsonomy COCOON The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
47Assane Gueye, Jean C. Walrand Security in networks: A game-theoretic approach. Search on Bibsonomy CDC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
47Wei He, Chunhe Xia, Haiquan Wang, Cheng Zhang, Yi Ji A Game Theoretical Attack-Defense Model Oriented to Network Security Risk Assessment. Search on Bibsonomy CSSE (6) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
47He Wei, Chunhe Xia, Haiquan Wang, Zhang Cheng, Ji Yi A Game Theoretical Attack-Defense Model Oriented to Network Security Risk Assessment. Search on Bibsonomy CSSE (3) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
47Mark E. Snyder, Ravi Sundaram, Mayur Thakur A Game-Theoretic Framework for Bandwidth Attacks and Statistical Defenses. Search on Bibsonomy LCN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
47Stefano Bistarelli, Marco Dall'Aglio, Pamela Peretti Strategic Games on Defense Trees. Search on Bibsonomy Formal Aspects in Security and Trust The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Security, Game Theory, Risk Analysis
40Haibo Zhang 0006, Shentong Ma, Tao Ding, Yong Lin, Mohammad Shahidehpour Multi-Stage Multi-Zone Defender-Attacker-Defender Model for Optimal Resilience Strategy With Distribution Line Hardening and Energy Storage System Deployment. Search on Bibsonomy IEEE Trans. Smart Grid The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
40Jacob T. English, Jay P. Wilhelm Defender-Aware Attacking Guidance Policy for the Target-Attacker-Defender Differential Game. Search on Bibsonomy J. Aerosp. Inf. Syst. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
40Nafiseh Ghorbani-Renani, Andrés D. González, Kash Barker A decomposition approach for solving tri-level defender-attacker-defender problems. Search on Bibsonomy Comput. Ind. Eng. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
40Yingmeng Xiang, Lingfeng Wang 0001 An Improved Defender-Attacker-Defender Model for Transmission Line Defense Considering Offensive Resource Uncertainties. Search on Bibsonomy IEEE Trans. Smart Grid The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
40Tao Ding, Li Yao, Fangxing Li 0001 A multi-uncertainty-set based two-stage robust optimization to defender-attacker-defender model for power system protection. Search on Bibsonomy Reliab. Eng. Syst. Saf. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
40Ali Marjanian, Soodabeh Soleymani Optimal investment in power system for defending against malicious attacks through defender-attacker-defender model and mixed strategy Nash equilibrium. Search on Bibsonomy Int. J. Crit. Infrastructures The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
40Jie Xu, Jun Zhuang 0001 Modeling costly learning and counter-learning in a defender-attacker game with private defender information. Search on Bibsonomy Ann. Oper. Res. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
40Eric Shieh, Albert Xin Jiang, Amulya Yadav, Pradeep Varakantham, Milind Tambe An extended study on addressing defender teamwork while accounting for uncertainty in attacker defender games using iterative Dec-MDPs. Search on Bibsonomy Multiagent Grid Syst. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
40Jiangliu Wang, Wei Li 0062 Motion patterns and phase-transition of a defender-intruder problem and optimal interception strategy of the defender. Search on Bibsonomy Commun. Nonlinear Sci. Numer. Simul. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
40Wei Yuan, Long Zhao, Bo Zeng Optimal power grid protection through a defender-attacker-defender model. Search on Bibsonomy Reliab. Eng. Syst. Saf. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
36Rajiv Ramnath, Vasudha Gupta, Jay Ramanathan RED-Transaction and Goal-Model Based Analysis of Layered Security of Physical Spaces. Search on Bibsonomy COMPSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF RED Transaction, Defender, Layered Security, Adversary, Assets
36Petr Jancar, Jirí Srba Undecidability of bisimilarity by defender's forcing. Search on Bibsonomy J. ACM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF process algebra, undecidability, pushdown automata, Bisimilarity
36Nan Zhang 0004, Wei Yu 0002, Xinwen Fu, Sajal K. Das 0001 Towards Effective Defense Against Insider Attacks: The Establishment of Defender's Reputation. Search on Bibsonomy ICPADS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
31Edmond S. L. Ho, Taku Komura Real-Time Character Control for Wrestling Games. Search on Bibsonomy MIG The full citation details ... 2009 DBLP  DOI  BibTeX  RDF motion capture, character animation
31Marios Mavronicolas, Loizos Michael, Vicky G. Papadopoulou, Anna Philippou, Paul G. Spirakis The Price of Defense. Search on Bibsonomy MFCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
31Zonghua Zhang, Pin-Han Ho, Xiaodong Lin 0001, Hong Shen 0001 Janus: A Two-Sided Analytical Model for Multi-Stage Coordinated Attacks. Search on Bibsonomy ICISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
31Kevin S. Killourhy, Roy A. Maxion, Kymie M. C. Tan A Defense-Centric Taxonomy Based on Attack Manifestations. Search on Bibsonomy DSN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
31Carrie Gates, Tara Whalen Profiling the defenders. Search on Bibsonomy NSPW The full citation details ... 2004 DBLP  DOI  BibTeX  RDF MBTI, psychological assessment, security
20Musheng Chen, Guowei He, Junhua Wu ZDDR: A Zero-Shot Defender for Adversarial Samples Detection and Restoration. Search on Bibsonomy IEEE Access The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
20Manar Khalid Ibraheem Ibraheem, Mbarka Belhaj Mohamed, Ahmed Fakhfakh Forest Defender Fusion System for Early Detection of Forest Fires. Search on Bibsonomy Comput. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
20Peizhuo Lv, Hualong Ma, Kai Chen, Jiachen Zhou, Shengzhi Zhang, Ruigang Liang, Shenchen Zhu, Pan Li, Yingjun Zhang MEA-Defender: A Robust Watermark against Model Extraction Attack. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
20Yuqi Zhang, Liang Ding, Lefei Zhang, Dacheng Tao Intention Analysis Prompting Makes Large Language Models A Good Jailbreak Defender. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
20Kyle Hunt, Jun Zhuang 0001 A review of attacker-defender games: Current state and paths forward. Search on Bibsonomy Eur. J. Oper. Res. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
20Jiangyi Deng, Xiaoyu Ji 0001, Beibei Wang 0001, Bin Wang 0062, Wenyuan Xu 0001 Dr. Defender: Proactive Detection of Autopilot Drones Based on CSI. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
20Anastasios Papathanasiou, George Liontos, Georgios Paparis, Vasiliki Liagkou, Euripides Glavas BEC Defender: QR Code-Based Methodology for Prevention of Business Email Compromise (BEC) Attacks. Search on Bibsonomy Sensors The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
20Han Fu, Hugh H. T. Liu Defending a Target Area With a Slower Defender. Search on Bibsonomy IEEE Control. Syst. Lett. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Naziya Aslam, Shashank Srivastava, M. M. Gore ONOS DDoS Defender: A Comparative Analysis of Existing DDoS Attack Datasets using Ensemble Approach. Search on Bibsonomy Wirel. Pers. Commun. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Ranyang Zhou, Sabbir Ahmed, Adnan Siraj Rakin, Shaahin Angizi DNN-Defender: An in-DRAM Deep Neural Network Defense Mechanism for Adversarial Weight Attack. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Luyi Li, Jiayi Huang 0001, Lang Feng, Zhongfeng Wang 0001 PREFENDER: A Prefetching Defender against Cache Side Channel Attacks as A Pretender. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Zimeng Song, Chun Kai Ling, Fei Fang 0001 Multi-defender Security Games with Schedules. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20André Correia, Luís A. Alexandre DEFENDER: DTW-Based Episode Filtering Using Demonstrations for Enhancing RL Safety. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Goutam Das, Michael R. Dorothy, Zachary I. Bell, Daigo Shishika Defending a Target with a Slower Defender against a Faster Attacker. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Hanyang Hu, Minh Bui, Mo Chen Multi-Agent Reach-Avoid Games: Two Attackers Versus One Defender and Mixed Integer Programming. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Haibin Wu, Jiawen Kang, Lingwei Meng, Helen Meng, Hung-yi Lee The defender's perspective on automatic speaker verification: An overview. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Gabriel Resende Machado, Eugênio Silva, Ronaldo Ribeiro Goldschmidt Adversarial Machine Learning in Image Classification: A Survey Toward the Defender's Perspective. Search on Bibsonomy ACM Comput. Surv. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Duong Thuy Anh Nguyen, Jiaming Cheng, Ni Trieu, Duong Tung Nguyen A Fairness-Aware Attacker-Defender Model for Optimal Edge Network Operation and Protection. Search on Bibsonomy IEEE Netw. Lett. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Najeeb Moharram Jebreel, Josep Domingo-Ferrer FL-Defender: Combating targeted attacks in federated learning. Search on Bibsonomy Knowl. Based Syst. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Elif Haktanir, Cengiz Kahraman Intelligent replacement analysis using picture fuzzy sets: Defender-challenger comparison application. Search on Bibsonomy Eng. Appl. Artif. Intell. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Zakir Ahmad Sheikh, Yashwant Singh, Pradeep Kumar Singh 0001, Paulo Jorge Sequeira Gonçalves Defending the Defender: Adversarial Learning Based Defending Strategy for Learning Based Security Methods in Cyber-Physical Systems (CPS). Search on Bibsonomy Sensors The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Alexander V. Outkin, Patricia V. Schulz, Timothy Schulz, Thomas D. Tarman, Ali Pinar Defender Policy Evaluation and Resource Allocation With MITRE ATT&CK Evaluations Data. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Cynara Justine, Sathyanarayanan Manamohan, Jiji Charangatt Victor SL-Defender: Decentralized Defense for Adversarial Robustness in Federated Learning. Search on Bibsonomy ICCST The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Austin K. Chen, Bryce L. Ferguson, Daigo Shishika, Michael R. Dorothy, Jason R. Marden, George J. Pappas, Vijay Kumar 0001 Path Defense in Dynamic Defender-Attacker Blotto Games (dDAB) with Limited Information. Search on Bibsonomy ACC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Hanyang Hu, Minh Bui, Mo Chen Multi-Agent Reach-Avoid Games: Two Attackers Versus One Defender and Mixed Integer Programming. Search on Bibsonomy CDC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Haibin Wu, Jiawen Kang, Lingwei Meng, Helen Meng, Hung-yi Lee The Defender's Perspective on Automatic Speaker Verification: An Overview. Search on Bibsonomy DADA@IJCAI The full citation details ... 2023 DBLP  BibTeX  RDF
20Mengyao Ma, Yanjun Zhang, Mahawaga Arachchige Pathum Chamikara, Leo Yu Zhang, Mohan Baruwal Chhetri, Guangdong Bai LoDen: Making Every Client in Federated Learning a Defender Against the Poisoning Membership Inference Attacks. Search on Bibsonomy AsiaCCS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Zhuoran Li, Dan Zhao 0001 μThingNet: Leveraging Fine-Grained Power Analysis towards A Robust Zero-Day Defender. Search on Bibsonomy SOCC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Attracta Brennan, Caroline Manghan, Mary Dempsey, John McAvoy, Sam Redfern Through a Gender Lens: A Serious Game for Young Children to Enhance Bullying Awareness and Encourage the Adoption of the Defender Role. Search on Bibsonomy JCSG The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Margarita Domènech, José Miguel Giménez, María Albina Puente Weak null, necessary defender and necessary detractor players: characterizations of the Banzhaf and the Shapley bisemivalues. Search on Bibsonomy Ann. Oper. Res. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
20E. Balamurugan, Abolfazl Mehbodniya, Elham Kariri, Kusum Yadav, Anil Kumar 0009, Mohd Anul Haq Network optimization using defender system in cloud computing security based intrusion detection system withgame theory deep neural network (IDSGT-DNN). Search on Bibsonomy Pattern Recognit. Lett. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
20Yuxuan Huang, Jiajing Wu, Chi K. Tse, Zibin Zheng Sequential Attacker-Defender Game on Complex Networks Considering the Cascading Failure Process. Search on Bibsonomy IEEE Trans. Comput. Soc. Syst. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
20Kyle Hunt, Puneet Agarwal, Jun Zhuang 0001 On the adoption of new technology to enhance counterterrorism measures: An attacker-defender game with risk preferences. Search on Bibsonomy Reliab. Eng. Syst. Saf. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
20Kamal Mammadov, Cheng-Chew Lim, Peng Shi 0001 A state-feedback Nash equilibrium for the general Target-Attacker-Defender differential game of degree in arbitrary dimensions. Search on Bibsonomy Int. J. Control The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
20Li Liang, Fang Deng, Jianan Wang, Maobin Lu, Jie Chen 0003 A Reconnaissance Penetration Game With Territorial-Constrained Defender. Search on Bibsonomy IEEE Trans. Autom. Control. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
20Reza Mohammadi 0003, Chhagan Lal, Mauro Conti, Lokesh Sharma Software defined network-based HTTP flooding attack defender. Search on Bibsonomy Comput. Electr. Eng. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
20Naziya Aslam, Shashank Srivastava, M. M. Gore ONOS Flood Defender: An Intelligent Approach to Mitigate DDoS Attack in SDN. Search on Bibsonomy Trans. Emerg. Telecommun. Technol. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
20Denis Pogonin, Igor Korkin Microsoft Defender Will Be Defended: MemoryRanger Prevents Blinding Windows AV. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
20Goutam Das, Michael R. Dorothy, Zachary I. Bell, Daigo Shishika Guarding a Non-Maneuverable Translating Line with an Attached Defender. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
20Dolev Mutzari, Yonatan Aumann, Sarit Kraus Robust Solutions for Multi-Defender Stackelberg Security Games. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
20Yuedong Xu, John C. S. Lui Multi-dimensional Network Security Game: How do attacker and defender battle on parallel targets? Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  BibTeX  RDF
20Austin K. Chen, Bryce L. Ferguson, Daigo Shishika, Michael R. Dorothy, Jason R. Marden, George J. Pappas, Vijay Kumar 0001 Path Defense in Dynamic Defender-Attacker Blotto Games (dDAB) with Limited Information. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
20Erick Galinkin, Emmanouil Pountourakis, John Carter, Spiros Mancoridis Simulation of Attacker Defender Interaction in a Noisy Security Game. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
20Kuan Li, Yang Liu 0200, Xiang Ao 0001, Jianfeng Chi, Jinghua Feng, Hao Yang 0037, Qing He 0003 Reliable Representations Make A Stronger Defender: Unsupervised Structure Refinement for Robust GNN. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
20Najeeb Jebreel, Josep Domingo-Ferrer FL-Defender: Combating Targeted Attacks in Federated Learning. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
20Goutam Das, Daigo Shishika Guarding a Translating Line with an Attached Defender. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
20Zhangnan Wang, Yichen Wang 0002 An Intelligent Pilot Contamination Attacker-Defender Model for Wireless Networks: A Stackelberg Game Based Approach. Search on Bibsonomy Mob. Networks Appl. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
20Amirhossein Asgharnia, Howard M. Schwartz 0001, Mohamed M. Atia Learning Deception Using Fuzzy Multi-Level Reinforcement Learning in a Multi-Defender One-Invader Differential Game. Search on Bibsonomy Int. J. Fuzzy Syst. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
20Vitaly Shalumov Interagent Distance Control in a Cooperative Multiagent Target-Missile-Defender Engagement. Search on Bibsonomy IEEE Trans. Control. Netw. Syst. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
20Rudra Prasad Baksi Pay or Not Pay? A Game-Theoretical Analysis of Ransomware Interactions Considering a Defender's Deception Architecture. Search on Bibsonomy DSN (Supplements) The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
20Amit Choudhari, Sylvain Guilley, Khaled Karray SpecDefender: Transient Execution Attack Defender using Performance Counters. Search on Bibsonomy ASHES@CCS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
20Yukio Ishihara Feedback of PC Security Measures Using Microsoft Defender for Endpoint. Search on Bibsonomy HCI (40) The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
20Zhangnan Wang, Yichen Wang 0002 A Pilot Contamination Attacker-Defender Model for Wireless Networks Under Stackelberg Game. Search on Bibsonomy VTC Spring The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
20Luyi Li, Jiayi Huang 0001, Lang Feng, Zhongfeng Wang 0001 PREFENDER: A Prefetching Defender against Cache Side Channel Attacks as A Pretender. Search on Bibsonomy DATE The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
20Amirhossein Asgharnia, Howard M. Schwartz 0001, Mohamed M. Atia Multi-Invader Multi-Defender Differential Game Using Reinforcement Learning. Search on Bibsonomy FUZZ-IEEE The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
20Thanh Hong Nguyen, Amulya Yadav The Risk of Attacker Behavioral Learning: Can Attacker Fool Defender Under Uncertainty? Search on Bibsonomy GameSec The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
20Goutam Das, Daigo Shishika Guarding a Translating Line with an Attached Defender. Search on Bibsonomy ACC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
20Daigo Shishika, Yue Guan, Michael R. Dorothy, Vijay Kumar 0001 Dynamic Defender-Attacker Blotto Game. Search on Bibsonomy ACC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
20Kuan Li, Yang Liu 0200, Xiang Ao 0001, Jianfeng Chi, Jinghua Feng, Hao Yang 0037, Qing He 0003 Reliable Representations Make A Stronger Defender: Unsupervised Structure Refinement for Robust GNN. Search on Bibsonomy KDD The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
20Thanh Nguyen, Haifeng Xu When Can the Defender Effectively Deceive Attackers in Security Games? Search on Bibsonomy AAAI The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
20Bryce L. Ferguson, Daigo Shishika, Jason R. Marden Ensuring the Defense of Paths and Perimeters in Dynamic Defender-Attacker Blotto Games (dDAB) on Graphs. Search on Bibsonomy Allerton The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
20Biru Zhu, Yujia Qin, Ganqu Cui, Yangyi Chen, Weilin Zhao, Chong Fu, Yangdong Deng, Zhiyuan Liu 0001, Jingang Wang, Wei Wu, Maosong Sun 0001, Ming Gu 0001 Moderate-fitting as a Natural Backdoor Defender for Pre-trained Language Models. Search on Bibsonomy NeurIPS The full citation details ... 2022 DBLP  BibTeX  RDF
20Dolev Mutzari, Yonatan Aumann, Sarit Kraus Robust Solutions for Multi-Defender Stackelberg Security Games. Search on Bibsonomy IJCAI The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
20Kyle Soska Security Defender Advantages Via Economically Rational Adversary Modeling. Search on Bibsonomy 2022   DOI  RDF
20Juan Sebastian Borrero, Leonardo Lozano Modeling Defender-Attacker Problems as Robust Linear Programs with Mixed-Integer Uncertainty Sets. Search on Bibsonomy INFORMS J. Comput. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
20Yu-Cheng Chen, Vincent John Mooney, Santiago Grijalva Grid Cyber-Security Strategy in an Attacker-Defender Model. Search on Bibsonomy Cryptogr. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
20Xiaoxiong Zhang, Song Ding, Bingfeng Ge, Boyuan Xia, Witold Pedrycz Resource allocation among multiple targets for a defender-attacker game with false targets consideration. Search on Bibsonomy Reliab. Eng. Syst. Saf. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
20Jing Zhang, Yan Wang, Jun Zhuang 0001 Modeling multi-target defender-attacker games with quantal response attack strategies. Search on Bibsonomy Reliab. Eng. Syst. Saf. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 266 (100 per page; Change: )
Pages: [1][2][3][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license