4,528 research outputs found

    Strategic Defense and Attack for Series and Parallel Reliability Systems: Comment

    Get PDF
    The contest-theoretic literature on the attack and defense of networks of targets focuses primarily on pure-strategy Nash equilibria. Hausken\u27s 2008 European Journal of Operational Research article typifies this approach, and many of the models in this literature either build upon this model or utilize similar techniques. We show that Hausken\u27s characterization of Nash equilibrium is invalid for much of the parameter space examined and provides necessary conditions for his solution to hold. The complete characterization of mixed-strategy equilibria remains an open problem, although there exist solutions in the literature for special prominent cases

    Electronic voting : 6th International Joint Conference, E-Vote-ID 2021, virtual event, October 5-8, 2021

    Get PDF
    This book constitutes the proceedings of the 6th International Conference on Electronic Voting, E-Vote-ID 2021, held online -due to COVID -19- in Bregenz, Austria, in October 2021. The 14 full papers presented were carefully reviewed and selected from 55 submissions. The conference collected the most relevant debates on the development of Electronic Voting, from aspects relating to security and usability through to practical experiences and applications of voting systems, as well as legal, social or political aspects

    Casanovas are liars : behavioral syndromes, sperm competition risk, and the evolution of deceptive male mating behavior in live-bearing fishes [version 2; referees: 2 approved, 1 approved with reservations]

    Get PDF
    Male reproductive biology can by characterized through competition over mates as well as mate choice. Multiple mating and male mate choice copying, especially in internally fertilizing species, set the stage for increased sperm competition, i.e., sperm of two or more males can compete for fertilization of the female’s ova. In the internally fertilizing fish Poecilia mexicana, males respond to the presence of rivals with reduced expression of mating preferences (audience effect), thereby lowering the risk of by-standing rivals copying their mate choice. Also, males interact initially more with a non-preferred female when observed by a rival, which has been interpreted in previous studies as a strategy to mislead rivals, again reducing sperm competition risk (SCR). Nevertheless, species might differ consistently in their expression of aggressive and reproductive behaviors, possibly due to varying levels of SCR. In the current study, we present a unique data set comprising ten poeciliid species (in two cases including multiple populations) and ask whether species can be characterized through consistent differences in the expression of aggression, sexual activity and changes in mate choice under increased SCR. We found consistent species-specific differences in aggressive behavior, sexual activity as well as in the level of misleading behavior, while decreased preference expression under increased SCR was a general feature of all but one species examined. Furthermore, mean sexual activity correlated positively with the occurrence of potentially misleading behavior. An alternative explanation for audience effects would be that males attempt to avoid aggressive encounters, which would predict stronger audience effects in more aggressive species. We demonstrate a positive correlation between mean aggressiveness and sexual activity (suggesting a hormonal link as a mechanistic explanation), but did not detect a correlation between aggressiveness and audience effects. Suites of correlated behavioral tendencies are termed behavioral syndromes, and our present study provides correlational evidence for the evolutionary significance of SCR in shaping a behavioral syndrome at the species level across poeciliid taxa

    Risk-attitude-based defense strategy considering proactive strike, preventive strike and imperfect false targets

    Get PDF
    This paper analyzes the optimal strategies for the attacker and the defender in an attack–defense game, considering the risk attitudes of both parties. The defender moves first, allocating its limited resources to three different measures: launching a proactive strike or preventive strike, building false targets, and protecting its genuine object. It is assumed that (a) launching a proactive strike has limited effectiveness on its rival and does not expose the genuine object itself, (b) a false target might be correctly identified as false, and (c) launching a preventive strike consumes less resources than a proactive strike and might expose the genuine object. The attacker moves after observing the defender's movements, allocating its limited resources to three measures: protecting its own base from a proactive strike or preventive strike, building false bases, and attacking the defender's genuine object. For each of the defender's given strategies, the attacker chooses the attack strategy that maximizes its cumulative prospect value, which accounts for the players’ risk attitudes. Similarly, the defender maximizes its cumulative prospect value by anticipating that the attacker will always choose the strategy combination that maximizes its own cumulative prospect value. Backward induction is used to obtain the optimal defense, attack strategies, and their corresponding cumulative prospect values. Our results show that the introduction of risk attitudes leads the game to a lose-lose situation under some circumstances and benefits one party in other cases

    Exploitation of Unintentional Information Leakage from Integrated Circuits

    Get PDF
    Unintentional electromagnetic emissions are used to recognize or verify the identity of a unique integrated circuit (IC) based on fabrication process-induced variations in a manner analogous to biometric human identification. The effectiveness of the technique is demonstrated through an extensive empirical study, with results presented indicating correct device identification success rates of greater than 99:5%, and average verification equal error rates (EERs) of less than 0:05% for 40 near-identical devices. The proposed approach is suitable for security applications involving commodity commercial ICs, with substantial cost and scalability advantages over existing approaches. A systematic leakage mapping methodology is also proposed to comprehensively assess the information leakage of arbitrary block cipher implementations, and to quantitatively bound an arbitrary implementation\u27s resistance to the general class of differential side channel analysis techniques. The framework is demonstrated using the well-known Hamming Weight and Hamming Distance leakage models, and approach\u27s effectiveness is demonstrated through the empirical assessment of two typical unprotected implementations of the Advanced Encryption Standard. The assessment results are empirically validated against correlation-based differential power and electromagnetic analysis attacks

    Trade-offs between feeding competition and predation risk in baboons

    Get PDF
    This study investigates the influence of feeding competition and predation risk on the behaviour and ecology of baboons. Four groups of chacma baboons (Papio cynocephalus ursinus) were habituated and studied over 12 months between 1990-91 in the Pro-Namib desert region of Namibia. Each group differed in size and composition (with 1-6 adult males occupying groups of between 22-55 members), but their ranges overlapped extensively. Additional data were collected describing (1) food quality and availability and (2) biologically relevant measures of predation risk. The results suggest that contest competition for food or safety was minimal both within and between groups in this population. However, scramble competition for food did occur, despite high levels of food availability. Female reproductive state had little influence on feeding or anti-predator behaviour. Females and individuals in small groups were shown to be at the greatest risk of predation, and responded as predicted by exhibiting the highest levels of anti-predator behaviour. Habitat use reflected a trade-off between food availability and the reduction of both diurnal and nocturnal predation risk. Individual spatial position within groups was influenced by male reproductive strategies and predation risk, although social constraints might also have been present. Vigilance in males reflected reproductive strategies while in females vigilance was aimed at predator detection. Trade-offs between foraging and predation risk were suggested in the patterns of home range habitat composition, the use of habitat in the home range, the presence of scramble feeding competition, the choice of feeding site and the choice of diet. In addition, large groups reduced feeding competition at the expense of increased predation risk. Finally, points of special interest included the reduction of predation risk by both (1) the active use of "rest" time and (2) the defensive behaviour of male group members
    corecore