Download Now Free registration required
The authors explain two-player security games which can be viewed as sequences of nonzero-sum matrix games played by an Attacker and a Defender. The evolution of the game is based on a stochastic fictitious play process. Players do not have access to each other's payoff matrix. Each has to observe the other's actions up to present and plays the action generated based on the best response to these observations. However, when the game is played over a communication network, there are several practical issues that need to be taken into account: first, the players may make random decision errors from time to time. Second, the players' observations of each other's previous actions may be incorrect.
- Format: PDF
- Size: 124.46 KB