Academic literature on the topic 'Defensive game systems'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Defensive game systems.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Defensive game systems"
Wu, Wenhao, and Bing Bu. "Security Analysis for CBTC Systems under Attack–Defense Confrontation." Electronics 8, no. 9 (September 5, 2019): 991. http://dx.doi.org/10.3390/electronics8090991.
Full textMolik, Bartosz, Natalia Morgulec-Adamowicz, Jolanta Marszałek, Andrzej Kosmol, Izabela Rutkowska, Alicja Jakubicka, Ewelina Kaliszewska, et al. "Evaluation of Game Performance in Elite Male Sitting Volleyball Players." Adapted Physical Activity Quarterly 34, no. 2 (April 2017): 104–24. http://dx.doi.org/10.1123/apaq.2015-0028.
Full textTian, Changjia, Varuna De Silva, Michael Caine, and Steve Swanson. "Use of Machine Learning to Automate the Identification of Basketball Strategies Using Whole Team Player Tracking Data." Applied Sciences 10, no. 1 (December 18, 2019): 24. http://dx.doi.org/10.3390/app10010024.
Full textGambarelli, Daniele, Gianfranco Gambarelli, and Dries Goossens. "Offensive or defensive play in soccer: a game-theoretical approach." Journal of Quantitative Analysis in Sports 15, no. 4 (October 25, 2019): 261–69. http://dx.doi.org/10.1515/jqas-2017-0071.
Full textZhang, Cevin, Karin Pukk Härenstam, Sebastiaan Meijer, and Adam S. Darwich. "Serious Gaming of Logistics Management in Pediatric Emergency Medicine." International Journal of Serious Games 7, no. 1 (March 2, 2020): 47–77. http://dx.doi.org/10.17083/ijsg.v7i1.334.
Full textPizarro, David, Alba Práxedes, Bruno Travassos, Bruno Gonçalves, and Alberto Moreno. "How Informational Constraints for Decision-Making on Passing, Dribbling and Shooting Change With the Manipulation of Small-Sided Games Changes in Futsal." Perceptual and Motor Skills 128, no. 4 (May 22, 2021): 1684–711. http://dx.doi.org/10.1177/00315125211016350.
Full textGuedea Delgado, Julio Cesar, Raúl Josué Nájera Longoria, Oscar Núñez Enríquez, Ramón Candía Luján, and Gabriel Gastélum Cuadras. "Sistemas tácticos y resultados de competición del Mundial de Fútbol Asociación de Rusia 2018.Tactical systems and matches results from the Football Association Worldcup Rusia 2018." Retos, no. 36 (June 6, 2019): 503–9. http://dx.doi.org/10.47197/retos.v36i36.69296.
Full textPraça, Gibson Moreira, Hugo Folgado, André Gustavo Pereira de Andrade, and Pablo Juan Greco. "Comportamento tático coletivo em Pequenos Jogos no Futebol: influência de jogadores adicionais." Brazilian Journal of Kinanthropometry and Human Performance 18, no. 1 (March 16, 2016): 62. http://dx.doi.org/10.5007/1980-0037.2016v18n1p62.
Full textMontgomery, Paul G., David B. Pyne, and Clare L. Minahan. "The Physical and Physiological Demands of Basketball Training and Competition." International Journal of Sports Physiology and Performance 5, no. 1 (March 2010): 75–86. http://dx.doi.org/10.1123/ijspp.5.1.75.
Full textZhang, Jing, Shifei Shen, and Rui Yang. "The impacts of adaptive attacking and defending strategies on mitigation of intentional threats." Kybernetes 39, no. 5 (June 15, 2010): 825–37. http://dx.doi.org/10.1108/03684921011043279.
Full textDissertations / Theses on the topic "Defensive game systems"
Guinto, Roi John. "Serious games for improved defense contracting." Thesis, Massachusetts Institute of Technology, 2014. http://hdl.handle.net/1721.1/90050.
Full textCataloged from PDF version of thesis.
Includes bibliographical references (pages 85-88). Gameography: page 89.
Gaming has been explored as a research technique in complex systems to explore human interactions within technical domains. These so-called "serious games" are designed for purposes outside of pure entertainment and are intended to help researchers engage with qualitative data that focuses on human behavior. This thesis focuses on a research game called ColumBID which was designed for the Production in the Innovation Economy shipbuilding study. This game seeks to understand the negotiation process in defense contracting and is used to facilitate and record the participants' movement through the tradespace. From a game theory perspective, we analyzed the non-Pareto dominant movements through the tradespace and found that humans explore the space by sliding along fronts until they reach an optimal and then jumping to another front to negotiate another optimal point. The players then compare these optimal points to simplify the multi-variable optimization. We found that an 8% contract price improvement in the competitive case compared to the monopolistic case. This thesis recommends that serious research game design focus on questions about the process rather than the endgame optimization.
by Roi John Guinto.
S.M. in Technology and Policy
Christofer, Malmberg, and Phan Henrik. "Lindenmayer’s Defense: Generating projectile patterns in a video game environment using L-Systems." Thesis, Malmö högskola, Fakulteten för teknik och samhälle (TS), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-20003.
Full textEldosouky, Mahmoud Salama Abdelrahman A. "Security of Critical Cyber-Physical Systems: Fundamentals and Optimization." Diss., Virginia Tech, 2019. http://hdl.handle.net/10919/90281.
Full textDoctor of Philosophy
Cyber-physical systems (CPSs) have recently been used in many application domains because of their ability to integrate physical elements with a cyber layer allowing for sensing, monitoring, and remote controlling. This pervasive use of CPSs in different applications has brought forward new security challenges and threats. Malicious attacks can now leverage the connectivity of the cyber layer to launch remote attacks and cause damage to the physical components. Taking these threats into consideration, it became imperative to ensure the security of CPSs. Given that many CPSs provide critical services, for instance many critical infrastructure (CI) are CPSs such as smart girds and nuclear reactors; it is then inevitable to ensure that these critical CPSs can maintain proper operation. One key measure of the CPS’s functionality, is resilience which evaluates the ability of a CPS to deliver its designated service under potentially disruptive situations. In general, resilience measures a CPS’s ability to adapt or rapidly recover from disruptive events. Therefore, it is crucial for CPSs to be resilient in face of potential failures. To this end, the central goal of this dissertation is to develop novel analytical frameworks that can evaluate and improve security and resilience of CPSs. In these frameworks, cross-disciplinary tools are used from game theory, contract theory, and optimization to develop robust analytical solutions for security and resilience problems. In particular, these frameworks led to the following key contributions in cyber security: developing an analytical framework to mitigate the effects of GPS spoofing attacks against UAVs, introducing a game-theoretic moving target defense (MTD) framework to improve the cyber security, and securing data privacy in m-health Internet of Things (IoT) networks using a MTD cryptographic framework. In addition, the dissertation led to the following contributions in CI resilience: developing a general framework using Bayesian Networks to evaluate and improve the resilience of CIs against their components failure, introducing a contracttheoretic model to allocate resources to multiple connected CIs under complete and asymmetric information scenarios, providing a proactive plan to improve the resilience of transportation networks against flooding, and, finally, developing an environment-aware framework to deploy UAVs in disaster-areas
Luo, Yi. "DECISION MAKING UNDER UNCERTAINTY IN DYNAMIC MULTI-STAGE ATTACKER-DEFENDER GAMES." Diss., The University of Arizona, 2011. http://hdl.handle.net/10150/204331.
Full textCampos, Simone Silva. "O jogo e os jogos: o jogo da leitura, o jogo de xadrez e a sanidade mental em A defesa Lujin, de Vladimir Nabokov." Universidade do Estado do Rio de Janeiro, 2014. http://www.bdtd.uerj.br/tde_busca/arquivo.php?codArquivo=6936.
Full textNo romance A defesa Lujin, de Vladimir Nabokov, publicado em russo em 1930, o texto procura levar o leitor a adotar processos mentais similares ao de um jogador de xadrez e de um esquizofrênico, características do personagem-título do romance. Delineiam-se as expectativas e circunstâncias de um ser de papel que se vê jogando um xadrez em que também é peça e traçam-se paralelos com as expectativas e circunstâncias do leitor perante esse texto literário. O prefácio de Nabokov à edição em inglês de 1964 é tomado como indício de um leitor e um autor implícitos que ele procura moldar. Para análise dos elementos textuais e níveis de abstração mental envolvidos, recorre-se à estética da recepção de Wolfgang Iser e a diversas ideias do psiquiatra e etnólogo Gregory Bateson, entre elas o conceito de duplo vínculo, com atenção às distinções entre mapa/território e play/game. Um duplo duplo vínculo é perpetrado na interação leitor-texto: 1) o leitor é convidado a sentir empatia pela situação do personagem Lujin e a considerá-lo lúcido e louco ao mesmo tempo; e 2) o leitor é colocado como uma instância pseudo-transcendental incapaz de comunicação com a instância inferior (Lujin), gerando uma angústia diretamente relacionável ao seu envolvimento com a ficção, replicando de certa forma a loucura de Lujin. A sinestesia do personagem Lujin é identificada como um dos elementos do texto capaz de recriar a experiência de jogar xadrez até para quem não aprecia o jogo. Analisa-se a conexão entre a esquizofrenia ficcional do personagem Lujin e a visão batesoniana do alcoolismo
In Vladimir Nabokovs novel, The Luzhin Defense, published in Russian in 1930, the text beckons the reader on to adopt mental processes similar to a chess players and a schizophrenic persons both traits of the novels title character. This character sees himself both as player and piece of an ongoing game of chess; his expectations and predicaments are traced in parallel to the readers own as he or she navigates the text. Nabokovs preface to the 1964 English edition is taken as an indication that he tries to shape both an implicit reader and an implicit author. In order to analyze the elements of the text and degrees of mental abstraction involved in this, we refer to Wolfgang Isers reader-response theory and also many of psychiatrist and ethnologist Gregory Batesons ideas, such as the double bind, with special regard to map vs. territory and play vs. game distinctions. A double double bind is built within the reader-text interplay as follows: 1) the reader is invited to feel empathy for Luzhins predicament and to regard him at once as sane and insane; and 2) the reader is posited as a pseudo-transcendental instance unable to communicate with his nether instance (Luzhin) in such a way that it brews a feeling of anxiety directly relatable to his or her engagement in the work of fiction, reproducing, in a way, Luzhins madness. Luzhins synesthesia is identified as one of the text elements with the ability to recreate the chess-playing experience even to readers who are not fond of the game. The connection between Luzhins fictional schizophrenia and Batesons views on alcoholism is analyzed
Růžek, Adam. "Využití taktických variant obranných herních systémů florbalových družstev v nejvyšších soutěžích České republiky a Finska." Master's thesis, 2021. http://www.nusl.cz/ntk/nusl-446409.
Full textLin, Hua-Chen, and 林華振. "Visual Strategy Analysis System for Basketball Game-Recognition of Offense and Defense Pattern." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/78298102674777739093.
Full text國立東華大學
資訊工程學系
98
Recently, sport video analysis is a popular topic in the field of computer vision. We analyze the relative 2D locations of players, basketball, and basket to determine offense and defense patterns in a basketball video captured in a fixed view point. The paper can be divided to two parts. The first part is to find the 2D projected locations of players, ball and basket. The second part is to extract features to find out the changes of offense and defense patterns in a basketball game. With the help of the proposed system, audiences can realize the game matching strategy and more deep information that are missing in current basketball game broadcasting.
Mark, Hung Chuang, and 莊泓. "The Influences of Cross-Strait Relations on ROC’s Military Capability with Respect to Economic Growth and Defense Budget:The Application of Game Theory and System Dynamics." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/89854795885576228667.
Full text國防管理學院
資源管理研究所
95
This study looks at the impact from the Cross-Strait economic relation to ROC's economic growth,and PRC's military threat.It's applied by game theory and system dynamics to evaluate the influences from the defense budget to ROC's military capability,and current situations.Meanwhile ,it provides correlative recommendations. According to the empirical analysis,if the tension of the Cross-Strait relation ceases both side to trade with each other,it will affect us more than the cease of the overseas trade;the cognition of PRC’s threats affects much higher than prior impacts.Besides, PRC’s purpose is to make us”not to fight”and”dare not to fight”,then ultimately causes our surrender without warfares.Due to such situations,we ROC ought not to overly depend upon the Mainland economically,and enforce our psychological reconstruction at the same time.Then we’ll not feel quite helpless to send PRC everything they ask.
Books on the topic "Defensive game systems"
The Sicilian defense: Taimanov system. New York: Collier Books, 1989.
Find full textSoltis, Andy. Black to play and win with 1-g6: A complete defensive system. 2nd ed. Dallas, Tex: Chess Digest, 1993.
Find full textJajodia, Sushil. Moving Target Defense II: Application of Game Theory and Adversarial Modeling. New York, NY: Springer New York, 2013.
Find full textSuper NES games secrets: For the super nintendo entertainment system. Rocklin, CA: Prima Pub., 1992.
Find full textEddy, Andy. Super NES Games Secrets. Rocklin, CA: Prima Publishing, 1992.
Find full textArnold, J. Douglas. Awesome Super Nintendo Secrets. Maui, USA: Sandwich Islands Publishing, 1992.
Find full textSoltis, Andy. Black Defensive System For The Rest Of Your Chess Career. 2nd ed. Chess Digest, 1997.
Find full textDagger, Richard. Playing Fair with Punishment. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780199388837.003.0007.
Full textJajodia, Sushil, Anup K. Ghosh, Cliff Wang, V. S. Subrahmanian, Vipin Swarup, and X. Sean Wang. Moving Target Defense II: Application of Game Theory and Adversarial Modeling. Springer, 2012.
Find full textJajodia, Sushil, Anup K. Ghosh, and V. S. Subrahmanian. Moving Target Defense II: Application of Game Theory and Adversarial Modeling. Springer, 2012.
Find full textBook chapters on the topic "Defensive game systems"
Li, Nianyu, Mingyue Zhang, Eunsuk Kang, and David Garlan. "Engineering Secure Self-Adaptive Systems with Bayesian Games." In Fundamental Approaches to Software Engineering, 130–51. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-71500-7_7.
Full textAdnan, Mohd, Toa Yang, Sayekat Kumar Das, and Tazeem Ahmad. "Utility of Game Theory in Defensive Wireless Sensor Networks (WSNs)." In Advances in Intelligent Systems and Computing, 895–904. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-5113-0_75.
Full textPradeep Kumar, K., and B. R. Prasad Babu. "DSMANET: Defensive Strategy of Routing Using Game Theory Approach for Mobile Adhoc Network." In Advances in Intelligent Systems and Computing, 311–20. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-91192-2_31.
Full textLevitin, Gregory. "Optimizing Defense Strategies for Complex Multi-State Systems." In Game Theoretic Risk Analysis of Security Threats, 33–64. Boston, MA: Springer US, 2008. http://dx.doi.org/10.1007/978-0-387-87767-9_3.
Full textSun, Xueyan, Xiaowu Liu, and Shuwen Zhang. "A Simplified Attack-Defense Game Model for NSSA." In Wireless Algorithms, Systems, and Applications, 820–28. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-21837-3_80.
Full textRavishankar, Monica, D. Vijay Rao, and C. R. S. Kumar. "Game Theory-Based Defense Mechanisms of Cyber Warfare." In Advances in Intelligent Systems and Computing, 149–52. Singapore: Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-10-8569-7_16.
Full textKim, Song-Kyoo. "Enhanced Design of Stochastic Defense System with Mixed Game Strategies." In Game Theory for Networking Applications, 107–17. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-93058-9_7.
Full textKumar, Bhupender, and Bubu Bhuyan. "Game Theoretical Defense Mechanism Against Bandwidth Based DDoS Attacks." In Proceedings of the International Conference on Computing and Communication Systems, 601–13. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-33-4084-8_58.
Full textSimmons, Chris B., Sajjan G. Shiva, Harkeerat Singh Bedi, and Vivek Shandilya. "ADAPT: A Game Inspired Attack-Defense and Performance Metric Taxonomy." In Security and Privacy Protection in Information Processing Systems, 344–65. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-39218-4_26.
Full textTan, Tse Guan, Yung Nan Yong, Kim On Chin, Jason Teo, and Rayner Alfred. "Automated Evaluation for AI Controllers in Tower Defense Game Using Genetic Algorithm." In Soft Computing Applications and Intelligent Systems, 135–46. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-40567-9_12.
Full textConference papers on the topic "Defensive game systems"
Garcia, Eloy, David W. Casbeer, and Meir Pachter. "Escape Regions of the Active Target Defense Differential Game." In ASME 2015 Dynamic Systems and Control Conference. American Society of Mechanical Engineers, 2015. http://dx.doi.org/10.1115/dscc2015-9628.
Full textHe, Fei, Chiamaka Agwuegbo, Nageswara S. V. Rao, and Chris Y. T. Ma. "A Sequential Game of Defense and Attack on an Interdependent System of Systems." In 2018 International Conference on Information Fusion (FUSION). IEEE, 2018. http://dx.doi.org/10.23919/icif.2018.8455314.
Full textZhang, Xiaoxiong, Kun Ding, Hui Zhang, and Guoquan Jiang. "Incorporating risk preferences into a defense-attack game." In 2020 IEEE International Conference on Systems, Man, and Cybernetics (SMC). IEEE, 2020. http://dx.doi.org/10.1109/smc42975.2020.9282870.
Full textPachter, Meir, David W. Casbeer, and Eloy Garcia. "Linear Quadratic Formulation of the Target Defense Differential Game." In 2019 International Conference on Unmanned Aircraft Systems (ICUAS). IEEE, 2019. http://dx.doi.org/10.1109/icuas.2019.8797892.
Full textGao, Xiang, and Yue-Fei Zhu. "DDoS Defense Mechanism Analysis Based on Signaling Game Model." In 2013 5th International Conference on Intelligent Human-Machine Systems and Cybernetics (IHMSC). IEEE, 2013. http://dx.doi.org/10.1109/ihmsc.2013.105.
Full textTurner, James D., and Brian P. Mann. "Sensitivity of Final Field Position to the Punt Initial Conditions in American Football." In ASME 2016 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. American Society of Mechanical Engineers, 2016. http://dx.doi.org/10.1115/detc2016-60235.
Full textCarta, Federica, Diego Ros McDonnell, and Pedro Enrique Collado Espejo. "El Castillo de La Atalaya (siglo XVIII), en Cartagena (Región de Murcia, España). Análisis formal y constructivo." In FORTMED2020 - Defensive Architecture of the Mediterranean. Valencia: Universitat Politàcnica de València, 2020. http://dx.doi.org/10.4995/fortmed2020.2020.11366.
Full textXiong, Qiang, Wei-jun Zhong, and Shu-e. Mei. "A signal game model on security defense of information system." In 2011 IEEE 18th International Conference on Industrial Engineering and Engineering Management. IEEE, 2011. http://dx.doi.org/10.1109/icieem.2011.6035162.
Full textLiang, Yu, and Donghua Qin. "A Bayesian Game Approach for Security Defense Strategy in WSN." In 2nd International Conference on Computer Application and System Modeling. Paris, France: Atlantis Press, 2012. http://dx.doi.org/10.2991/iccasm.2012.275.
Full textStrasser, Benjamin. "What's in a game: game-theoretic analysis for third party planning." In Open Architecture/Open Business Model Net-Centric Systems and Defense Transformation 2021, edited by Raja Suresh. SPIE, 2021. http://dx.doi.org/10.1117/12.2589560.
Full textReports on the topic "Defensive game systems"
Letchford, Joshua. Game Theory for Proactive Dynamic Defense and Attack Mitigation in Cyber-Physical Systems. Office of Scientific and Technical Information (OSTI), September 2016. http://dx.doi.org/10.2172/1330190.
Full textHoffman, Wyatt. AI and the Future of Cyber Competition. Center for Security and Emerging Technology, January 2021. http://dx.doi.org/10.51593/2020ca007.
Full text