VIDEO DOI: https://doi.org/10.48448/yxd6-g181

technical paper

ECAI 2020

August 31, 2020

Live on Underline

Decoding the Imitation Security Game: Handling Attacker Imitative Behavior Deception

Please log in to leave a comment

Downloads

Transcript English (automatic)

Next from ECAI 2020

Tackling Imitative Attacker Deception in Repeated Bayesian Stackelberg Security Games
technical paper

Tackling Imitative Attacker Deception in Repeated Bayesian Stackelberg Security Games

ECAI 2020

Thanh Nguyen
Thanh Nguyen

31 August 2020

Similar lecture

Strategic Monitor Placement against Malicious Flows
technical paper

Strategic Monitor Placement against Malicious Flows

ECAI 2020

Diodato Ferraioli
Diodato Ferraioli

31 August 2020