no code implementations • 8 Dec 2022 • Erick Galinkin, Emmanouil Pountourakis, John Carter, Spiros Mancoridis
In the cybersecurity setting, defenders are often at the mercy of their detection technologies and subject to the information and experiences that individual analysts have.
no code implementations • 9 Sep 2021 • Yutong Wu, Ali Khodabakhsh, Bo Li, Evdokia Nikolova, Emmanouil Pountourakis
Namely, besides charging the player the reported value, the mechanism charges a penalty proportional to her inconsistent reports.