March 19, 2024, 4:10 a.m. | Jon Goohs, Georgel Savin, Lucas Starks, Josiah Dykstra, William Casey

cs.CR updates on arXiv.org arxiv.org

arXiv:2403.10789v1 Announce Type: new
Abstract: Variations of the Flip-It game have been applied to model network cyber operations. While Flip-It can accurately express uncertainty and loss of control, it imposes no essential resource constraints for operations. Capture the flag (CTF) style competitive games, such as Flip-It , entail uncertainties and loss of control, but also impose realistic constraints on resource use. As such, they bear a closer resemblance to actual cyber operations. We formalize a dynamical network control game for …

adversarial arxiv can capture competitive constraints control cs.cr ctf cyber cyber operations express flag flip game games information loss network operations resource uncertainty

Information Security Cyber Risk Analyst

@ Intel | USA - AZ - Chandler

Senior Cloud Security Engineer (Fullstack)

@ Grab | Petaling Jaya, Malaysia

Principal Product Security Engineer

@ Oracle | United States

Cybersecurity Strategy Director

@ Proofpoint | Sunnyvale, CA

Information Security Consultant/Auditor

@ Devoteam | Lisboa, Portugal

IT Security Engineer til Netcompany IT Services

@ Netcompany | Copenhagen, Denmark