no code implementations • 5 Mar 2021 • Mustafa Abdallah, Timothy Cason, Saurabh Bagchi, Shreyas Sundaram
Each node has a certain value to the attacker and the defender, along with a probability of being successfully compromised, which is a function of the investments in that node by both players.
no code implementations • 12 Nov 2020 • Mustafa Abdallah, Daniel Woods, Parinaz Naghizadeh, Issa Khalil, Timothy Cason, Shreyas Sundaram, Saurabh Bagchi
We model the behavioral biases of human decision-making in securing interdependent systems and show that such behavioral decision-making leads to a suboptimal pattern of resource allocation compared to non-behavioral (rational) decision-making.
no code implementations • 4 Apr 2020 • Mustafa Abdallah, Daniel Woods, Parinaz Naghizadeh, Issa Khalil, Timothy Cason, Shreyas Sundaram, Saurabh Bagchi
We model the security investment decisions made by the defenders as a security game.
Cryptography and Security Computer Science and Game Theory