scholarly journals Developing an advanced classifier of threat for security agent behavior models

Author(s):  
О.В. Мілов ◽  
С.В. Мілевський ◽  
О.Г. Король
Author(s):  
Joana Urbano ◽  
Henrique Lopes Cardoso ◽  
Ana Paula Rocha ◽  
Eugénio Oliveira

Despite relevant insights from socio-economics, little research in multi-agent systems has addressed the interconnections between trust and normative notions such as contracts and sanctions. Focusing our attention on scenarios of betrayal, in this paper we combine the use of trust and sanctions in a negotiation process. We describe a scenario of dyadic relationships between truster agents, which make use of trust and/or sanctions, and trustee agents, characterized by their ability and integrity, which may influence their attitude toward betrayal. Both agent behavior models are inspired in socio-economics literature. Through simulation, we show the virtues and shortcomings of using trust, sanctions, and a combination of both in processes of selection of partners.


2008 ◽  
Author(s):  
Steven Solomon ◽  
Michael van Lent ◽  
Mark Core ◽  
Paul Carpenter ◽  
Milton Rosenberg

2019 ◽  
Vol 13 (4) ◽  
pp. 325-333
Author(s):  
Xu Liu ◽  
Xiaoqiang Di ◽  
Jinqing Li ◽  
Huamin Yang ◽  
Ligang Cong ◽  
...  

Background: User behavior models have been widely used to simulate attack behaviors in the security domain. We revised all patents related to response to attack behavior models. How to decide the protected target against multiple models of attack behaviors is studied. Methods: We utilize one perfect rational and three bounded rational behavior models to simulate attack behaviors in cloud computing, and then investigate cloud provider’s response based on Stackelberg game. The cloud provider plays the role of defender and it is assumed to be intelligent enough to predict the attack behavior model. Based on the prediction accuracy, two schemes are built in two situations. Results: If the defender can predict the attack behavior model accurately, a single-objective game model is built to find the optimal protection strategy; otherwise, a multi-objective game model is built to find the optimal protection strategy. Conclusion: The numerical results prove that the game theoretic model performs better in the corresponding situation.


Author(s):  
YongAn LI

Background: The symbolic nodal analysis acts as a pivotal part of the very large scale integration (VLSI) design. Methods: In this work, based on the terminal relations for the pathological elements and the voltage differencing inverting buffered amplifier (VDIBA), twelve alternative pathological models for the VDIBA are presented. Moreover, the proposed models are applied to the VDIBA-based second-order filter and oscillator so as to simplify the circuit analysis. Results: The result shows that the behavioral models for the VDIBA are systematic, effective and powerful in the symbolic nodal circuit analysis.</P>


2017 ◽  
Vol 46 (6) ◽  
pp. 985-1002 ◽  
Author(s):  
Gian Paolo Cimellaro ◽  
Fabrizio Ozzello ◽  
Alessio Vallero ◽  
Stephen Mahin ◽  
Benshun Shao

Sign in / Sign up

Export Citation Format

Share Document