483,870 research outputs found
Game Theory Meets Network Security: A Tutorial at ACM CCS
The increasingly pervasive connectivity of today's information systems brings
up new challenges to security. Traditional security has accomplished a long way
toward protecting well-defined goals such as confidentiality, integrity,
availability, and authenticity. However, with the growing sophistication of the
attacks and the complexity of the system, the protection using traditional
methods could be cost-prohibitive. A new perspective and a new theoretical
foundation are needed to understand security from a strategic and
decision-making perspective. Game theory provides a natural framework to
capture the adversarial and defensive interactions between an attacker and a
defender. It provides a quantitative assessment of security, prediction of
security outcomes, and a mechanism design tool that can enable
security-by-design and reverse the attacker's advantage. This tutorial provides
an overview of diverse methodologies from game theory that includes games of
incomplete information, dynamic games, mechanism design theory to offer a
modern theoretic underpinning of a science of cybersecurity. The tutorial will
also discuss open problems and research challenges that the CCS community can
address and contribute with an objective to build a multidisciplinary bridge
between cybersecurity, economics, game and decision theory
Strange attractors in periodically-kicked degenerate Hopf bifurcations
We prove that spiral sinks (stable foci of vector fields) can be transformed
into strange attractors exhibiting sustained, observable chaos if subjected to
periodic pulsatile forcing. We show that this phenomenon occurs in the context
of periodically-kicked degenerate supercritical Hopf bifurcations. The results
and their proofs make use of a new multi-parameter version of the theory of
rank one maps developed by Wang and Young.Comment: 16 page
Determination of anisotropic dipole moments in self-assembled quantum dots using Rabi oscillations
By investigating the polarization-dependent Rabi oscillations using
photoluminescence spectroscopy, we determined the respective transition dipole
moments of the two excited excitonic states |Ex> and |Ey> of a single
self-assembled quantum dot that are nondegenerate due to shape anisotropy. We
find that the ratio of the two dipole moments is close to the physical
elongation ratio of the quantum dot.Comment: 11 pages, 2 figures, MS Word generated PDF fil
Gamma-Ray Burst Jet Profiles And Their Signatures
HETE-II and BeppoSAX have produced a sample of GRBs and XRFs with known
redshifts and . This sample provides four important empirical
constraints on the nature of the source jets: Log is approximately
uniformly distributed over several orders of magnitude; the inferred prompt
energy Log is narrowly distributed; the Amati relation holds
between and ; and the Ghirlanda relation holds between
and .
We explore the implications of these constraints for GRB jet structure during
the prompt emission phase. We infer the underlying angular profiles from the
first two of the above constraints assuming all jets have the same profile and
total energy, and show that such ``universal jet'' models cannot satisfy both
constraints.
We introduce a general and efficient method for calculating relativistic
emission distributions and distributions from jets with arbitrary
(smooth) angular jet profiles. We also exhibit explicit analytical formulas for
emission from top-hat jets (which are not smooth). We use these methods to
exhibit and as a function of viewing angle, for several
interesting families of GRB jet profiles. We use the same methods to calculate
expected frequency distributions of and for the same
families of models.
We then proceed to explore the behavior of universal jet models under a range
of profile shapes and parameters, to map the extent to which these models can
conform to the above four empirical constraints.Comment: 71 page, 33 figures. Submitted to Ap
- …