- Full text PDF available (5)
Game-theoretic analysis has emerged as an important method for making resource allocation decisions in both infrastructure protection and cyber security domains. However, static equilibrium models defined based on inputs from domain experts have weaknesses; they can be inaccurate , and they do not adapt over time as the situation (and adversary) evolves. In… (More)
Course Description The purpose of this course is to introduce students to cryptography, the science of secret message writing. Students will have the opportunity to use mathematical concepts to execute historical and modern cryptographical algorithms. General Course Purpose With society becoming more reliant on digital and computing technology, the ability… (More)
We introduce a model for border security resource allocation with repeated interactions between attackers and defenders. The defender must learn the optimal resource allocation strategy based on historical apprehension data, balancing exploration and exploitation in the policy. We experiment with several solution methods for this online learning problem… (More)
We present fully three-dimensional simulation results for a real HBT structure as applied in MMICs. Investigation of the leakage is performed in attempt to explain device behavior in the complete voltage range. The paper gives a justification of the need for three-dimensional simulation and addresses critical development, modeling, and simulation issues.
We analyse active space debris removal efforts from a strategic, game-theoretical perspective. Space debris is non-manoeuvrable, human-made objects orbiting Earth, which pose a significant threat to operational spacecraft. Active debris removal missions have been considered and investigated by different space agencies with the goal to protect valuable… (More)