Academic literature on the topic 'Defensive game systems'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Defensive game systems.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Defensive game systems"

1

Wu, Wenhao, and Bing Bu. "Security Analysis for CBTC Systems under Attack–Defense Confrontation." Electronics 8, no. 9 (September 5, 2019): 991. http://dx.doi.org/10.3390/electronics8090991.

Full text
Abstract:
Communication-based train controls (CBTC) systems play a major role in urban rail transportation. As CBTC systems are no longer isolated from the outside world but use other networks to increase efficiency and improve productivity, they are exposed to huge cyber threats. This paper proposes a generalized stochastic Petri net (GSPN) model to capture dynamic interaction between the attacker and the defender to evaluate the security of CBTC systems. Depending on the characteristics of the system and attack–defense methods, we divided our model into two phases: penetration and disruption. In each phase, we provided effective means of attack and corresponding defensive measures, and the system state was determined correspondingly. Additionally, a semiphysical simulation platform and game model were proposed to assist the GSPN model parameterization. With the steady-state probability of the system output from the model, we propose several indicators for assessing system security. Finally, we compared the security of the system with single defensive measures and multiple defensive measures. Our evaluations indicated the significance of the defensive measures and the seriousness of the system security situation.
APA, Harvard, Vancouver, ISO, and other styles
2

Molik, Bartosz, Natalia Morgulec-Adamowicz, Jolanta Marszałek, Andrzej Kosmol, Izabela Rutkowska, Alicja Jakubicka, Ewelina Kaliszewska, et al. "Evaluation of Game Performance in Elite Male Sitting Volleyball Players." Adapted Physical Activity Quarterly 34, no. 2 (April 2017): 104–24. http://dx.doi.org/10.1123/apaq.2015-0028.

Full text
Abstract:
The aims of the current study were (a) to analyze the differences in game performances of sitting volleyball athletes representing the different types of disabilities and (b) to assess whether the seated position vertical reach is one of the crucial factors in the game performance level of sitting volleyball athletes. One hundred male athletes from various national teams participating in the European Championships in Sitting Volleyball (2009) took part in this study. The athletes were categorized according to type of disability and the results of the vertical reach in a seated position. Thirtysix games were analyzed using the Game Performance Sheet for Sitting Volleyball. Twenty-three game performance parameters were studied. In addition, the sum and effectiveness of attacks, blocks, block services, services, ball receiving, and defensive actions were calculated. The main results indicated significant differences between athletes with minimal disability and athletes with single amputations from above the knee in the level of defensive performances and the summation of defensive actions. There was also a significant difference between athletes in relation to their vertical reach during activity and attacking actions, blocks, and ball receiving. In addition, there were strong relationships between the players’ vertical reach scores and their activity and effectiveness in sitting volleyball. In conclusion, the accuracy of the World Organization Volleyball for Disabled classification systems for sitting volleyball players was confirmed. There is a strong relationship between players’ vertical reach and their effectiveness in sitting volleyball.
APA, Harvard, Vancouver, ISO, and other styles
3

Tian, Changjia, Varuna De Silva, Michael Caine, and Steve Swanson. "Use of Machine Learning to Automate the Identification of Basketball Strategies Using Whole Team Player Tracking Data." Applied Sciences 10, no. 1 (December 18, 2019): 24. http://dx.doi.org/10.3390/app10010024.

Full text
Abstract:
The use of machine learning to identify and classify offensive and defensive strategies in team sports through spatio-temporal tracking data has received significant interest recently in the literature and the global sport industry. This paper focuses on data-driven defensive strategy learning in basketball. Most research to date on basketball strategy learning has focused on offensive effectiveness and is based on the interaction between the on-ball player and principle on-ball defender, thereby ignoring the contribution of the remaining players. Furthermore, most sports analytical systems that provide play-by-play data is heavily biased towards offensive metrics such as passes, dribbles, and shots. The aim of the current study was to use machine learning to classify the different defensive strategies basketball players adopt when deviating from their initial defensive action. An analytical model was developed to recognise the one-on-one (matched) relationships of the players, which is utilised to automatically identify any change of defensive strategy. A classification model is developed based on a player and ball tracking dataset from National Basketball Association (NBA) game play to classify the adopted defensive strategy against pick-and-roll play. The methodology described is the first to analyse the defensive strategy of all in-game players (both on-ball players and off-ball players). The cross-validation results indicate that the proposed technique for automatic defensive strategy identification can achieve up to 69% accuracy of classification. Machine learning techniques, such as the one adopted here, have the potential to enable a deeper understanding of player decision making and defensive game strategies in basketball and other sports, by leveraging the player and ball tracking data.
APA, Harvard, Vancouver, ISO, and other styles
4

Gambarelli, Daniele, Gianfranco Gambarelli, and Dries Goossens. "Offensive or defensive play in soccer: a game-theoretical approach." Journal of Quantitative Analysis in Sports 15, no. 4 (October 25, 2019): 261–69. http://dx.doi.org/10.1515/jqas-2017-0071.

Full text
Abstract:
Abstract In many sports, such as soccer, a coach has to decide whether to adopt an “offensive” or a “defensive” approach to a match. This strategic decision depends on the strengths and weaknesses of his team with respect to the opponent, but also on the strategy chosen by the opponent’s coach. The fact that a draw also results in a point, which may be important for the ranking, further complicates this decision, as the coach must assess whether it is better to adopt a defensive team formation in order to obtain a draw, or to aim for victory despite the increased risk of defeat. We study this topic by means of a game-theoretical approach, and we develop an algorithm which allows to compute the optimal strategy. The algorithm tests the stability of the outcome with respect to uncertainty in the estimated win probabilities. Furthermore, our approach can handle in-game events, which may provoke changes in optimal strategy. Finally, our model also allows us to assess the effect of various point systems on the willingness of teams to opt for attacking play. Our method is applied to a case study, based on the match Italy – Costa Rica (World Cup 2014).
APA, Harvard, Vancouver, ISO, and other styles
5

Zhang, Cevin, Karin Pukk Härenstam, Sebastiaan Meijer, and Adam S. Darwich. "Serious Gaming of Logistics Management in Pediatric Emergency Medicine." International Journal of Serious Games 7, no. 1 (March 2, 2020): 47–77. http://dx.doi.org/10.17083/ijsg.v7i1.334.

Full text
Abstract:
Access blocks throughout the entire healthcare system and overcrowding issues are pervasive in many emergency departments where the coordination and strategic management of resources could be supported by serious games and simulations approaches. However, existing studies have not addressed the reciprocal relation between patient inflow and working systems in serious games design in order to reflect the logistical features of an emergency department and to facilitate the players improve the work performance of the system. To address the issue, this paper presents a serious game based on a multi-method simulation approach of complex healthcare processes as well as the game mechanics selected to promote understanding the logistical features of an ED, which points to the next level of conducting simulations or gaming aimed for training decision making skills in operative environments. Results of the experiment confirmed that the serious game encouraged participants to proactively manage the human resources of the emergency department. Certain managerial recommendations can be made: a patient flow multiplier of 120% could lead to a significant erosion of the system’s defensive ability; however, proactive anticipation from management is the key for making an emergency organization more resilient.
APA, Harvard, Vancouver, ISO, and other styles
6

Pizarro, David, Alba Práxedes, Bruno Travassos, Bruno Gonçalves, and Alberto Moreno. "How Informational Constraints for Decision-Making on Passing, Dribbling and Shooting Change With the Manipulation of Small-Sided Games Changes in Futsal." Perceptual and Motor Skills 128, no. 4 (May 22, 2021): 1684–711. http://dx.doi.org/10.1177/00315125211016350.

Full text
Abstract:
In this study, we explored how manipulating floaters’ positions in small-sided futsal games (SSGs) promote changes in the informational constraints that support decision-making (DM) for passing, dribbling and shooting tactics. We made changes in four experimental 3 vs 3 small-sided game conditions with 30 male futsal players (U19 age category): (a) Floaters Off (FO), (b) Final Line Floaters (FLF), (c) Lateral Floaters own field sideline (LFofsl) and (d) Lateral Floaters full field sideline (LFffsl). We assessed players’ activity with WIMU PRO™ software during the SSGs, using the Game Performance Evaluation Tool (GPET) to analyze a total of 1,635 decisions. DM for dribbling was generally based on the interpersonal distance between the ball carrier and direct opponent, considering the defensive team length and the offensive team area. Shooting decisions were constrained, by certain attacking-defending teams’ spatial-temporal relations with regard to playing space and team balance as affected by manipulating floaters’ positions. The coaches’ decisions to change the floaters’ positions during SSGs may change informational variables sustaining the dribbling decision, but no changes in SSG variables affected passing DM.
APA, Harvard, Vancouver, ISO, and other styles
7

Guedea Delgado, Julio Cesar, Raúl Josué Nájera Longoria, Oscar Núñez Enríquez, Ramón Candía Luján, and Gabriel Gastélum Cuadras. "Sistemas tácticos y resultados de competición del Mundial de Fútbol Asociación de Rusia 2018.Tactical systems and matches results from the Football Association Worldcup Rusia 2018." Retos, no. 36 (June 6, 2019): 503–9. http://dx.doi.org/10.47197/retos.v36i36.69296.

Full text
Abstract:
Sistemas tácticos y resultados de competición del Mundial de Fútbol Asociación de Rusia 2018Tactical systems and match results from FIFA Worldcup Rusia 2018Julio Cesar Guedea Delgado, Raúl Josué Nájera Longoria, Oscar Núñez Enríquez, Ramón Candía Luján, Gabriel Gastélum CuadrasUniversidad Autónoma de Chihuahua (México) Resumen. Los sistemas tácticos dentro del fútbol soccer son elementales tanto a la ofensiva como a la defensiva. El presente estudio consiste en el analizar los sistemas tácticos y resultados de juego de Mundial de Rusia 2018. Se analizaron los 64 partidos, cuyos datos se extrajeron de la Web oficial de la Federación Internacional de Fútbol Asociación (FIFA, www.fifa.com) y registros que se obtuvieron del programa de Sky SPORTS® del canal 1535, los datos se confirmaron mediante el Sky SPORTS® que ofrece una toma táctica aérea en el canal 1536. Los resultados más sobresalientes son el sistema más utilizado el 1-4-2-3-1, donde los dos equipos del 1ro Francia y 2do lugar Croacia lo utilizaron con mayor frecuencia, así mismo el 1-3-5-2 y 1-3-4-3 que son más ofensivos, en los equipos del 3ro lugar Bélgica y 4to lugar Inglaterra. Estos sistemas en ocasiones a la defensiva cambian, dependiendo del rival y las circunstancias, así como la táctica del entrenador. Hoy en día, los sistemas de juego y las metodologías de entrenamiento marcan una pauta específica para los entrenadores, buscando futbolistas que dominen los aspectos técnico-tácticos, que entiendan el sistema y la filosofía de juego que plantea el entrenador y que defiendan y ataquen con la misma intensidad independientemente de la posición que asuman.Abstract. Tactical systems within football (soccer) are either used in offense and defense. This study aims at analyzing match results and tactical systems during the Russia 2018 World Cup. All 64 matches were analyzed, data being extracted from the official website of the International Federation (FIFA, www.fifa.com), whereas records from the Sky SPORTS® channel 1535. Data was confirmed with Sky SPORTS® since it offers a sky view in their channel 1536. The most used lineup system was 1-4-2-3-1, with teams such as France (1st) and Croatia (2nd) using it more frequently, as well the lineup 1-3-5-2 and 1-3-4-3, which are more offensive, used by teams such as Belguim (3rd) and England (4th). These lineup systems, together with the coaching tactics, occasionally changed defensive wise, upon rival and circumstances. Currently, game systems and training methodologies set the pace for coaches, who look for football players who dominate technical-tactics aspects, understand the systems, their game philosophy, and being tough offensive and defensive players regardless of their field position.
APA, Harvard, Vancouver, ISO, and other styles
8

Praça, Gibson Moreira, Hugo Folgado, André Gustavo Pereira de Andrade, and Pablo Juan Greco. "Comportamento tático coletivo em Pequenos Jogos no Futebol: influência de jogadores adicionais." Brazilian Journal of Kinanthropometry and Human Performance 18, no. 1 (March 16, 2016): 62. http://dx.doi.org/10.5007/1980-0037.2016v18n1p62.

Full text
Abstract:
DOI: http://dx.doi.org/10.5007/1980-0037.2016v18n1p62 The aim of this study was to compare the collective tactical behavior between numerically balanced and unbalanced small-sided soccer games. Eighteen male soccer players (mean age 16.4 years) participated in the study. Polar coordinate analysis was performed using positional data obtained with a 15-Hz GPS device. Collective variables including length, width, centroid distance (average point between teammates), and length per width ratio (LPWratio) were collected. Data were analyzed using Friedman’s test. The results showed greater length and width values in 4vs.3 games, while a higher LPWratiowas observed in 3vs.3+2 games compared to the other configurations. In games with an additional player (4vs.3), ball circulation and the increase in effective game space were alternatives to overcome the more concentrated defensive systems near the goal. On the other hand, 3vs.3+2 games allowed more actions in the length axis and a fast reach of the opponent’s goal.
APA, Harvard, Vancouver, ISO, and other styles
9

Montgomery, Paul G., David B. Pyne, and Clare L. Minahan. "The Physical and Physiological Demands of Basketball Training and Competition." International Journal of Sports Physiology and Performance 5, no. 1 (March 2010): 75–86. http://dx.doi.org/10.1123/ijspp.5.1.75.

Full text
Abstract:
Purpose:To characterize the physical and physiological responses during different basketball practice drills and games.Methods:Male basketball players (n = 11; 19.1 ± 2.1 y, 1.91 ± 0.09 m, 87.9 ± 15.1 kg; mean ± SD) completed offensive and defensive practice drills, half court 5on5 scrimmage play, and competitive games. Heart rate, VO2 and triaxial accelerometer data (physical demand) were normalized for individual participation time. Data were log-transformed and differences between drills and games standardized for interpretation of magnitudes and reported with the effect size (ES) statistic.Results:There was no substantial difference in the physical or physiological variables between offensive and defensive drills; physical load (9.5%; 90% confidence limits ±45); mean heart rate (-2.4%; ±4.2); peak heart rate (-0.9%; ±3.4); and VO2 (–5.7%; ±9.1). Physical load was moderately greater in game play compared with a 5on5 scrimmage (85.2%; ±40.5); with a higher mean heart rate (12.4%; ±5.4). The oxygen demand for live play was substantially larger than 5on5 (30.6%; ±15.6).Conclusions:Defensive and offensive drills during basketball practice have similar physiological responses and physical demand. Live play is substantially more demanding than a 5on5 scrimmage in both physical and physiological attributes. Accelerometers and predicted oxygen cost from heart rate monitoring systems are useful for differentiating the practice and competition demands of basketball.
APA, Harvard, Vancouver, ISO, and other styles
10

Zhang, Jing, Shifei Shen, and Rui Yang. "The impacts of adaptive attacking and defending strategies on mitigation of intentional threats." Kybernetes 39, no. 5 (June 15, 2010): 825–37. http://dx.doi.org/10.1108/03684921011043279.

Full text
Abstract:
PurposeThe purpose of this paper is to focus on resource allocation and information disclosure policy for defending multiple targets against intentional attacks. The intentional attacks, like terrorism events, probably cause great losses and fatalities. Attackers and defenders usually make decisions based on incomplete information. Adaptive attacking and defending strategies are considered, to study how both sides make more effective decisions according to previous fights.Design/methodology/approachA stochastic game‐theoretic approach is proposed for modeling attacker‐defender conflicts. Attackers and defenders are supposed both to be strategic decision makers and partially aware of adversary's information. Adaptive strategies are compared with different inflexible strategies in a fortification‐patrol problem, where the fortification affects the security vulnerability of targets and the patrol indicates the defensive signal.FindingsThe result shows that the intentional risk would be elevated by adaptive attack strategies. An inflexible defending strategy probably fails when facing uncertainties of adversary. It is shown that the optimal response of defenders is to adjust defending strategies by learning from previous games and assessing behaviors of adversaries to minimize the expected loss.Originality/valueThis paper explores how adaptive strategies affect attacker‐defender conflicts. The key issue is defense allocation and information disclosure policy for mitigation of intentional threats. Attackers and defenders can adjust their strategies by learning from previous fights, and the strategic adjustment of both sides may be asynchronous.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Defensive game systems"

1

Guinto, Roi John. "Serious games for improved defense contracting." Thesis, Massachusetts Institute of Technology, 2014. http://hdl.handle.net/1721.1/90050.

Full text
Abstract:
Thesis: S.M. in Technology and Policy, Massachusetts Institute of Technology, Engineering Systems Division, Technology and Policy Program, 2014.
Cataloged from PDF version of thesis.
Includes bibliographical references (pages 85-88). Gameography: page 89.
Gaming has been explored as a research technique in complex systems to explore human interactions within technical domains. These so-called "serious games" are designed for purposes outside of pure entertainment and are intended to help researchers engage with qualitative data that focuses on human behavior. This thesis focuses on a research game called ColumBID which was designed for the Production in the Innovation Economy shipbuilding study. This game seeks to understand the negotiation process in defense contracting and is used to facilitate and record the participants' movement through the tradespace. From a game theory perspective, we analyzed the non-Pareto dominant movements through the tradespace and found that humans explore the space by sliding along fronts until they reach an optimal and then jumping to another front to negotiate another optimal point. The players then compare these optimal points to simplify the multi-variable optimization. We found that an 8% contract price improvement in the competitive case compared to the monopolistic case. This thesis recommends that serious research game design focus on questions about the process rather than the endgame optimization.
by Roi John Guinto.
S.M. in Technology and Policy
APA, Harvard, Vancouver, ISO, and other styles
2

Christofer, Malmberg, and Phan Henrik. "Lindenmayer’s Defense: Generating projectile patterns in a video game environment using L-Systems." Thesis, Malmö högskola, Fakulteten för teknik och samhälle (TS), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-20003.

Full text
Abstract:
The potential of L-systems is explored byprocedurally generating patterns for use as video game content.By procedurally generating content for video games, thedevelopment costs of game development can be significantlyreduced. An artifact in the form of a tower defense game isdeveloped and tested to evaluate the generation algorithm. Thealgorithm was successful in generating a wide range of pattern anduser feedback indicates a high level of perceived variation. Thealgorithm is highly customizable and could have applications invarious game content such as particle systems or weapons
APA, Harvard, Vancouver, ISO, and other styles
3

Eldosouky, Mahmoud Salama Abdelrahman A. "Security of Critical Cyber-Physical Systems: Fundamentals and Optimization." Diss., Virginia Tech, 2019. http://hdl.handle.net/10919/90281.

Full text
Abstract:
Cyber-physical systems (CPSs) are systems that integrate physical elements with a cyber layer that enables sensing, monitoring, and processing the data from the physical components. Examples of CPSs include autonomous vehicles, unmanned aerial vehicles (UAVs), smart grids, and the Internet of Things (IoT). In particular, many critical infrastructure (CI) that are vital to our modern day cities and communities, are CPSs. This wide range of CPSs domains represents a cornerstone of smart cities in which various CPSs are connected to provide efficient services. However, this level of connectivity has brought forward new security challenges and has left CPSs vulnerable to many cyber-physical attacks and disruptive events that can utilize the cyber layer to cause damage to both cyber and physical components. Addressing these security and operation challenges requires developing new security solutions to prevent and mitigate the effects of cyber and physical attacks as well as improving the CPSs response in face of disruptive events, which is known as the CPS resilience. To this end, the primary goal of this dissertation is to develop novel analytical tools that can be used to study, analyze, and optimize the resilience and security of critical CPSs. In particular, this dissertation presents a number of key contributions that pertain to the security and the resilience of multiple CPSs that include power systems, the Internet of Things (IoT), UAVs, and transportation networks. First, a mathematical framework is proposed to analyze and mitigate the effects of GPS spoofing attacks against UAVs. The proposed framework uses system dynamics to model the optimal routes which UAVs can follow in normal operations and under GPS spoofing attacks. A countermeasure mechanism, built on the premise of cooperative localization, is then developed to mitigate the effects of these GPS spoofing attacks. To practically deploy the proposed defense mechanism, a dynamic Stackelberg game is formulated to model the interactions between a GPS spoofer and a drone operator. The equilibrium strategies of the game are analytically characterized and studied through a novel, computationally efficient algorithm. Simulation results show that, when combined with the Stackelberg strategies, the proposed defense mechanism will outperform baseline strategy selection techniques in terms of reducing the possibility of UAV capture. Next, a game-theoretic framework is developed to model a novel moving target defense (MTD) mechanism that enables CPSs to randomize their configurations to proactive deter impending attacks. By adopting an MTD approach, a CPS can enhance its security against potential attacks by increasing the uncertainty on the attacker. The equilibrium of the developed single-controller, stochastic MTD game is then analyzed. Simulation results show that the proposed framework can significantly improve the overall utility of the defender. Third, the concept of MTD is coupled with new cryptographic algorithms for enhancing the security of an mHealth Internet of Things (IoT) system. In particular, using a combination of theory and implementation, a framework is introduced to enable the IoT devices to update their cryptographic keys locally to eliminate the risk of being revealed while they are shared. Considering the resilience of CPSs, a novel framework for analyzing the component- and system-level resilience of CIs is proposed. This framework brings together new ideas from Bayesian networks and contract theory – a Nobel prize winning theory – to define a concrete system-level resilience index for CIs and to optimize the allocation of resources, such as redundant components, monitoring devices, or UAVs to help those CIs improve their resilience. In particular, the developed resilience index is able to account for the effect of CI components on the its probability of failure. Meanwhile, using contract theory, a comprehensive resource allocation framework is proposed enabling the system operator to optimally allocate resources to each individual CI based on its economic contribution to the entire system. Simulation results show that the system operator can economically benefit from allocating the resources while dams can have a significant improvement in their resilience indices. Subsequently, the developed contract-theoretic framework is extended to account for cases of asymmetric information in which the system operator has only partial information about the CIs being in some vulnerability and criticality levels. Under such asymmetry, it is shown that the proposed approach maximizes the system operator's utility while ensuring that no CI has an incentive to ask for another contract. Next, a proof-of-concept framework is introduced to analyze and improve the resilience of transportation networks against flooding. The effect of flooding on road capacities and on the free-flow travel time, is considered for different rain intensities and roads preparedness. Meanwhile, the total system's travel time before and after flooding is evaluated using the concept of a Wardrop equilibrium. To this end, a proactive mechanism is developed to reduce the system's travel time, after flooding, by shifting capacities (available lanes) between same road sides. In a nutshell, this dissertation provides a suite of analytical techniques that allow the optimization of security and resilience across multiple CPSs.
Doctor of Philosophy
Cyber-physical systems (CPSs) have recently been used in many application domains because of their ability to integrate physical elements with a cyber layer allowing for sensing, monitoring, and remote controlling. This pervasive use of CPSs in different applications has brought forward new security challenges and threats. Malicious attacks can now leverage the connectivity of the cyber layer to launch remote attacks and cause damage to the physical components. Taking these threats into consideration, it became imperative to ensure the security of CPSs. Given that many CPSs provide critical services, for instance many critical infrastructure (CI) are CPSs such as smart girds and nuclear reactors; it is then inevitable to ensure that these critical CPSs can maintain proper operation. One key measure of the CPS’s functionality, is resilience which evaluates the ability of a CPS to deliver its designated service under potentially disruptive situations. In general, resilience measures a CPS’s ability to adapt or rapidly recover from disruptive events. Therefore, it is crucial for CPSs to be resilient in face of potential failures. To this end, the central goal of this dissertation is to develop novel analytical frameworks that can evaluate and improve security and resilience of CPSs. In these frameworks, cross-disciplinary tools are used from game theory, contract theory, and optimization to develop robust analytical solutions for security and resilience problems. In particular, these frameworks led to the following key contributions in cyber security: developing an analytical framework to mitigate the effects of GPS spoofing attacks against UAVs, introducing a game-theoretic moving target defense (MTD) framework to improve the cyber security, and securing data privacy in m-health Internet of Things (IoT) networks using a MTD cryptographic framework. In addition, the dissertation led to the following contributions in CI resilience: developing a general framework using Bayesian Networks to evaluate and improve the resilience of CIs against their components failure, introducing a contracttheoretic model to allocate resources to multiple connected CIs under complete and asymmetric information scenarios, providing a proactive plan to improve the resilience of transportation networks against flooding, and, finally, developing an environment-aware framework to deploy UAVs in disaster-areas
APA, Harvard, Vancouver, ISO, and other styles
4

Luo, Yi. "DECISION MAKING UNDER UNCERTAINTY IN DYNAMIC MULTI-STAGE ATTACKER-DEFENDER GAMES." Diss., The University of Arizona, 2011. http://hdl.handle.net/10150/204331.

Full text
Abstract:
This dissertation presents efficient, on-line, convergent methods to find defense strategies against attacks in dynamic multi-stage attacker-defender games including adaptive learning. This effort culminated in four papers submitted to high quality journals and a book and they are partially published. The first paper presents a novel fictitious play approach to describe the interactions between the attackers and network administrator along a dynamic game. Multi-objective optimization methodology is used to predict the attacker's best actions at each decision node. The administrator also keeps track of the attacker's actions and updates his knowledge on the attacker's behavior and objectives after each detected attack, and uses this information to update the prediction of the attacker's future actions to find its best response strategies. The second paper proposes a Dynamic game tree based Fictitious Play (DFP) approach to describe the repeated interactive decision processes of the players. Each player considers all possibilities in future interactions with their uncertainties, which are based on learning the opponent's decision process (including risk attitude, objectives). Instead of searching the entire game tree, appropriate future time horizons are dynamically selected for both players. The administrator keeps tracking the opponent's actions, predicts the probabilities of future possible attacks, and then chooses its best moves. The third paper introduces an optimization model to maximize the deterministic equivalent of the random payoff function of a computer network administrator in defending the system against random attacks. By introducing new variables the transformed objective function becomes concave. A special optimization algorithm is developed which requires the computation of the unique solution of a single variable monotonic equation. The fourth paper, which is an invited book chapter, proposes a discrete-time stochastic control model to capture the process of finding the best current move of the defender. The defender's payoffs at each stage of the game depend on the attacker's and the defender's accumulative efforts and are considered random variables due to their uncertainty. Their certain equivalents can be approximated based on their first and second moments which is chosen as the cost functions of the dynamic system. An on-line, convergent, Scenarios based Proactive Defense (SPD) algorithm is developed based on Differential Dynamic Programming (DDP) to solve the associated optimal control problem.
APA, Harvard, Vancouver, ISO, and other styles
5

Campos, Simone Silva. "O jogo e os jogos: o jogo da leitura, o jogo de xadrez e a sanidade mental em A defesa Lujin, de Vladimir Nabokov." Universidade do Estado do Rio de Janeiro, 2014. http://www.bdtd.uerj.br/tde_busca/arquivo.php?codArquivo=6936.

Full text
Abstract:
Fundação de Amparo à Pesquisa do Estado do Rio de Janeiro
No romance A defesa Lujin, de Vladimir Nabokov, publicado em russo em 1930, o texto procura levar o leitor a adotar processos mentais similares ao de um jogador de xadrez e de um esquizofrênico, características do personagem-título do romance. Delineiam-se as expectativas e circunstâncias de um ser de papel que se vê jogando um xadrez em que também é peça e traçam-se paralelos com as expectativas e circunstâncias do leitor perante esse texto literário. O prefácio de Nabokov à edição em inglês de 1964 é tomado como indício de um leitor e um autor implícitos que ele procura moldar. Para análise dos elementos textuais e níveis de abstração mental envolvidos, recorre-se à estética da recepção de Wolfgang Iser e a diversas ideias do psiquiatra e etnólogo Gregory Bateson, entre elas o conceito de duplo vínculo, com atenção às distinções entre mapa/território e play/game. Um duplo duplo vínculo é perpetrado na interação leitor-texto: 1) o leitor é convidado a sentir empatia pela situação do personagem Lujin e a considerá-lo lúcido e louco ao mesmo tempo; e 2) o leitor é colocado como uma instância pseudo-transcendental incapaz de comunicação com a instância inferior (Lujin), gerando uma angústia diretamente relacionável ao seu envolvimento com a ficção, replicando de certa forma a loucura de Lujin. A sinestesia do personagem Lujin é identificada como um dos elementos do texto capaz de recriar a experiência de jogar xadrez até para quem não aprecia o jogo. Analisa-se a conexão entre a esquizofrenia ficcional do personagem Lujin e a visão batesoniana do alcoolismo
In Vladimir Nabokovs novel, The Luzhin Defense, published in Russian in 1930, the text beckons the reader on to adopt mental processes similar to a chess players and a schizophrenic persons both traits of the novels title character. This character sees himself both as player and piece of an ongoing game of chess; his expectations and predicaments are traced in parallel to the readers own as he or she navigates the text. Nabokovs preface to the 1964 English edition is taken as an indication that he tries to shape both an implicit reader and an implicit author. In order to analyze the elements of the text and degrees of mental abstraction involved in this, we refer to Wolfgang Isers reader-response theory and also many of psychiatrist and ethnologist Gregory Batesons ideas, such as the double bind, with special regard to map vs. territory and play vs. game distinctions. A double double bind is built within the reader-text interplay as follows: 1) the reader is invited to feel empathy for Luzhins predicament and to regard him at once as sane and insane; and 2) the reader is posited as a pseudo-transcendental instance unable to communicate with his nether instance (Luzhin) in such a way that it brews a feeling of anxiety directly relatable to his or her engagement in the work of fiction, reproducing, in a way, Luzhins madness. Luzhins synesthesia is identified as one of the text elements with the ability to recreate the chess-playing experience even to readers who are not fond of the game. The connection between Luzhins fictional schizophrenia and Batesons views on alcoholism is analyzed
APA, Harvard, Vancouver, ISO, and other styles
6

Růžek, Adam. "Využití taktických variant obranných herních systémů florbalových družstev v nejvyšších soutěžích České republiky a Finska." Master's thesis, 2021. http://www.nusl.cz/ntk/nusl-446409.

Full text
Abstract:
This thesis compares the use of different tactical variants in the defence game of Floorball teams of both Czech and Finnish elite competitions. The aim of the thesis is to map and compare the use of defensive game systems. The theoretical part is devoted to comparing the history and the present of Floorball in the Czech Republic and Finland. In this part, the thesis also deals with sports training, game performance, and tactical training and describes the individual Floorball game systems and the sport itself. In the practical part, observations are used to evaluate, which defensive game systems are most often chosen by the selected teams. The use of game systems was investigated using the method of indirect structured observation and quantitative research. The output is of the thesis are annotated results of the individual matches. KEYWORDS: floorball, defensive game systems, Finland, Czech Republic, Superliga, F-Liiga
APA, Harvard, Vancouver, ISO, and other styles
7

Lin, Hua-Chen, and 林華振. "Visual Strategy Analysis System for Basketball Game-Recognition of Offense and Defense Pattern." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/78298102674777739093.

Full text
Abstract:
碩士
國立東華大學
資訊工程學系
98
Recently, sport video analysis is a popular topic in the field of computer vision. We analyze the relative 2D locations of players, basketball, and basket to determine offense and defense patterns in a basketball video captured in a fixed view point. The paper can be divided to two parts. The first part is to find the 2D projected locations of players, ball and basket. The second part is to extract features to find out the changes of offense and defense patterns in a basketball game. With the help of the proposed system, audiences can realize the game matching strategy and more deep information that are missing in current basketball game broadcasting.
APA, Harvard, Vancouver, ISO, and other styles
8

Mark, Hung Chuang, and 莊泓. "The Influences of Cross-Strait Relations on ROC’s Military Capability with Respect to Economic Growth and Defense Budget:The Application of Game Theory and System Dynamics." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/89854795885576228667.

Full text
Abstract:
碩士
國防管理學院
資源管理研究所
95
This study looks at the impact from the Cross-Strait economic relation to ROC's economic growth,and PRC's military threat.It's applied by game theory and system dynamics to evaluate the influences from the defense budget to ROC's military capability,and current situations.Meanwhile ,it provides correlative recommendations. According to the empirical analysis,if the tension of the Cross-Strait relation ceases both side to trade with each other,it will affect us more than the cease of the overseas trade;the cognition of PRC’s threats affects much higher than prior impacts.Besides, PRC’s purpose is to make us”not to fight”and”dare not to fight”,then ultimately causes our surrender without warfares.Due to such situations,we ROC ought not to overly depend upon the Mainland economically,and enforce our psychological reconstruction at the same time.Then we’ll not feel quite helpless to send PRC everything they ask.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Defensive game systems"

1

The Sicilian defense: Taimanov system. New York: Collier Books, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Soltis, Andy. Black to play and win with 1-g6: A complete defensive system. 2nd ed. Dallas, Tex: Chess Digest, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Jajodia, Sushil. Moving Target Defense II: Application of Game Theory and Adversarial Modeling. New York, NY: Springer New York, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Super NES games secrets: For the super nintendo entertainment system. Rocklin, CA: Prima Pub., 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Eddy, Andy. Super NES Games Secrets. Rocklin, CA: Prima Publishing, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Arnold, J. Douglas. Awesome Super Nintendo Secrets. Maui, USA: Sandwich Islands Publishing, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Soltis, Andy. Black Defensive System For The Rest Of Your Chess Career. 2nd ed. Chess Digest, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Dagger, Richard. Playing Fair with Punishment. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780199388837.003.0007.

Full text
Abstract:
Chapter 6 turns from the explication and defense of legal punishment as a general practice to the task of developing and defending the fair-play theory of punishment in particular. As developed by Herbert Morris and others, the theory holds that punishment is justified, ceteris paribus, because law breakers try to enjoy the benefits of a legal system without bearing its burdens, thereby taking unfair advantage of those who obey the laws. I elaborate this account by drawing out the connection between legal systems and cooperative practices, arguing that the analogy between fair play in a game and fair play in a polity, or legal system, is not simply misguided. I then respond to five serious objections that critics have leveled against fair play as an account of punishment. I conclude by considering the gentler complaint that fair play is too narrow to provide a satisfactory justification for legal punishment.
APA, Harvard, Vancouver, ISO, and other styles
9

Jajodia, Sushil, Anup K. Ghosh, Cliff Wang, V. S. Subrahmanian, Vipin Swarup, and X. Sean Wang. Moving Target Defense II: Application of Game Theory and Adversarial Modeling. Springer, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Jajodia, Sushil, Anup K. Ghosh, and V. S. Subrahmanian. Moving Target Defense II: Application of Game Theory and Adversarial Modeling. Springer, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Defensive game systems"

1

Li, Nianyu, Mingyue Zhang, Eunsuk Kang, and David Garlan. "Engineering Secure Self-Adaptive Systems with Bayesian Games." In Fundamental Approaches to Software Engineering, 130–51. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-71500-7_7.

Full text
Abstract:
AbstractSecurity attacks present unique challenges to self-adaptive system design due to the adversarial nature of the environment. Game theory approaches have been explored in security to model malicious behaviors and design reliable defense for the system in a mathematically grounded manner. However, modeling the system as a single player, as done in prior works, is insufficient for the system under partial compromise and for the design of fine-grained defensive strategies where the rest of the system with autonomy can cooperate to mitigate the impact of attacks. To deal with such issues, we propose a new self-adaptive framework incorporating Bayesian game theory and model the defender (i.e., the system) at the granularity ofcomponents. Under security attacks, the architecture model of the system is translated into aBayesian multi-player game, where each component is explicitly modeled as an independent player while security attacks are encoded as variant types for the components. The optimal defensive strategy for the system is dynamically computed by solving the pure equilibrium (i.e., adaptation response) to achieve the best possible system utility, improving the resiliency of the system against security attacks. We illustrate our approach using an example involving load balancing and a case study on inter-domain routing.
APA, Harvard, Vancouver, ISO, and other styles
2

Adnan, Mohd, Toa Yang, Sayekat Kumar Das, and Tazeem Ahmad. "Utility of Game Theory in Defensive Wireless Sensor Networks (WSNs)." In Advances in Intelligent Systems and Computing, 895–904. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-5113-0_75.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Pradeep Kumar, K., and B. R. Prasad Babu. "DSMANET: Defensive Strategy of Routing Using Game Theory Approach for Mobile Adhoc Network." In Advances in Intelligent Systems and Computing, 311–20. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-91192-2_31.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Levitin, Gregory. "Optimizing Defense Strategies for Complex Multi-State Systems." In Game Theoretic Risk Analysis of Security Threats, 33–64. Boston, MA: Springer US, 2008. http://dx.doi.org/10.1007/978-0-387-87767-9_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Sun, Xueyan, Xiaowu Liu, and Shuwen Zhang. "A Simplified Attack-Defense Game Model for NSSA." In Wireless Algorithms, Systems, and Applications, 820–28. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-21837-3_80.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Ravishankar, Monica, D. Vijay Rao, and C. R. S. Kumar. "Game Theory-Based Defense Mechanisms of Cyber Warfare." In Advances in Intelligent Systems and Computing, 149–52. Singapore: Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-10-8569-7_16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Kim, Song-Kyoo. "Enhanced Design of Stochastic Defense System with Mixed Game Strategies." In Game Theory for Networking Applications, 107–17. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-93058-9_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Kumar, Bhupender, and Bubu Bhuyan. "Game Theoretical Defense Mechanism Against Bandwidth Based DDoS Attacks." In Proceedings of the International Conference on Computing and Communication Systems, 601–13. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-33-4084-8_58.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Simmons, Chris B., Sajjan G. Shiva, Harkeerat Singh Bedi, and Vivek Shandilya. "ADAPT: A Game Inspired Attack-Defense and Performance Metric Taxonomy." In Security and Privacy Protection in Information Processing Systems, 344–65. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-39218-4_26.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Tan, Tse Guan, Yung Nan Yong, Kim On Chin, Jason Teo, and Rayner Alfred. "Automated Evaluation for AI Controllers in Tower Defense Game Using Genetic Algorithm." In Soft Computing Applications and Intelligent Systems, 135–46. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-40567-9_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Defensive game systems"

1

Garcia, Eloy, David W. Casbeer, and Meir Pachter. "Escape Regions of the Active Target Defense Differential Game." In ASME 2015 Dynamic Systems and Control Conference. American Society of Mechanical Engineers, 2015. http://dx.doi.org/10.1115/dscc2015-9628.

Full text
Abstract:
The active target defense differential game is addressed in this paper. In this differential game an Attacker missile pursues a Target aircraft. The aircraft is however aided by a Defender missile launched by, say, the wingman, to intercept the Attacker before it reaches the Target aircraft. Thus, a team is formed by the Target and the Defender which cooperate to maximize the separation between the Target aircraft and the point where the Attacker missile is intercepted by the Defender missile, while the Attacker simultaneously tries to minimize said distance. This paper focuses on characterizing the set of coordinates such that if the Target’s initial position belong to this set then its survival is guaranteed if both the Target and the Defender follow their optimal strategies. Such optimal strategies are presented in this paper as well.
APA, Harvard, Vancouver, ISO, and other styles
2

He, Fei, Chiamaka Agwuegbo, Nageswara S. V. Rao, and Chris Y. T. Ma. "A Sequential Game of Defense and Attack on an Interdependent System of Systems." In 2018 International Conference on Information Fusion (FUSION). IEEE, 2018. http://dx.doi.org/10.23919/icif.2018.8455314.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Zhang, Xiaoxiong, Kun Ding, Hui Zhang, and Guoquan Jiang. "Incorporating risk preferences into a defense-attack game." In 2020 IEEE International Conference on Systems, Man, and Cybernetics (SMC). IEEE, 2020. http://dx.doi.org/10.1109/smc42975.2020.9282870.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Pachter, Meir, David W. Casbeer, and Eloy Garcia. "Linear Quadratic Formulation of the Target Defense Differential Game." In 2019 International Conference on Unmanned Aircraft Systems (ICUAS). IEEE, 2019. http://dx.doi.org/10.1109/icuas.2019.8797892.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Gao, Xiang, and Yue-Fei Zhu. "DDoS Defense Mechanism Analysis Based on Signaling Game Model." In 2013 5th International Conference on Intelligent Human-Machine Systems and Cybernetics (IHMSC). IEEE, 2013. http://dx.doi.org/10.1109/ihmsc.2013.105.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Turner, James D., and Brian P. Mann. "Sensitivity of Final Field Position to the Punt Initial Conditions in American Football." In ASME 2016 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. American Society of Mechanical Engineers, 2016. http://dx.doi.org/10.1115/detc2016-60235.

Full text
Abstract:
The starting field position is often a deciding factor in an American football game. In the case of a defensive stop, a kick, known as a punt, is used to give the receiving team a field position that is more advantageous to the kicking team when possession changes. The goal of the punter is to kick the ball along a desired flight path, where a delicate balance between the distance traveled before impact, hang time in the air, and the distance traveled after bouncing is favorable for the kicking team. However, the punter has only imprecise control over the initial conditions, such as the angular velocity, linear velocity, and orientation of the football. Due to the highly nonlinear behavior of the football, from aerodynamic and impact forces, even small changes in initial conditions can produce large changes in the final position of the football, but there may be regions of initial conditions with relatively consistent results. If punters could target such large contiguous regions of initial conditions with desirable football paths, they could improve their chances of successful kicks. For nonlinear systems, basins of attraction diagrams are often used to graphically display the initial conditions that lead to different final attractors. In this case, the regions of initial conditions that lead to a desirable final field position can be grouped and shown graphically. A numerical simulation program was developed including models for aerodynamic flight and bouncing of the irregularly shaped football. The flight model used fourth order Runge-Kutta integration of the equations of motion of the football, including gravitational and aerodynamic forces and moments with empirical lift, drag, and yaw coefficients in three dimensions. The bounce model was based on an empirical two-dimensional coefficient of restitution model that was published in the literature. The behavior of a football in flight and during bouncing was simulated for a range of initial angular velocities and launch angles, and the characteristics of the flight paths were analyzed. The characteristics of some regions of initial conditions were relatively sensitive to small changes, while other regions were relatively uniform. This shows that this approach, with a quantitatively accurate bounce model, could be practically applied to develop a guide for punters to optimize their kicks. With such a guide and sufficient practice, punters could select and target the larger regions of initial conditions that produced desirable behavior, which would improve their chances of successful punts.
APA, Harvard, Vancouver, ISO, and other styles
7

Carta, Federica, Diego Ros McDonnell, and Pedro Enrique Collado Espejo. "El Castillo de La Atalaya (siglo XVIII), en Cartagena (Región de Murcia, España). Análisis formal y constructivo." In FORTMED2020 - Defensive Architecture of the Mediterranean. Valencia: Universitat Politàcnica de València, 2020. http://dx.doi.org/10.4995/fortmed2020.2020.11366.

Full text
Abstract:
The Atalaya Castle (eighteenth century), in Cartagena (Region of Murcia, Spain). Formal and constructive analysisThe Atalaya Castle (eighteenth century) is one of the military fortifications that were part of the defense of Cartagena. The defensive system of the period was composed of an important walled enclosure, which surrounded the city, the arsenal, and a group of fortresses outside the city wall, located on the nearby hills. One of these defensive constructions is the Atalaya Castle or Fort, located to the west of the city from its position it protected the population from attacks both by land and by sea. To the north and west by land, through the Almarjal and the Pelayo mountains, the south by sea covered the possible landings in the bays of the Algameca Grande and the Algameca Chica. The building is a magnificently construction, the fort has a pentagon ground plan with five bastions at each angle. It has an interior building in U arranged on a solid bastioned platform the whole complex is surrounded by a dry moat. The fortification present certain formal elements used in other constructions that had been lifted in the city at that time, circumstance gave unity to the whole. The materials consisted of employed mainly stone and brick, the constructive elements introduce certain heterogeneity. The purpose of the communication is to present the results of the comprehensive analysis carried out in the Atalaya Castle as well as to contribute, through its dissemination to raise awareness of the need for its restoration and enhancement. Research has studied the characteristics of the formal and constructive system of the fortification currently in a state of semiabandonment, a proposal has also been conducted for a new cultural use as a guarantee of its correct recovery and conservation.
APA, Harvard, Vancouver, ISO, and other styles
8

Xiong, Qiang, Wei-jun Zhong, and Shu-e. Mei. "A signal game model on security defense of information system." In 2011 IEEE 18th International Conference on Industrial Engineering and Engineering Management. IEEE, 2011. http://dx.doi.org/10.1109/icieem.2011.6035162.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Liang, Yu, and Donghua Qin. "A Bayesian Game Approach for Security Defense Strategy in WSN." In 2nd International Conference on Computer Application and System Modeling. Paris, France: Atlantis Press, 2012. http://dx.doi.org/10.2991/iccasm.2012.275.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Strasser, Benjamin. "What's in a game: game-theoretic analysis for third party planning." In Open Architecture/Open Business Model Net-Centric Systems and Defense Transformation 2021, edited by Raja Suresh. SPIE, 2021. http://dx.doi.org/10.1117/12.2589560.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Defensive game systems"

1

Letchford, Joshua. Game Theory for Proactive Dynamic Defense and Attack Mitigation in Cyber-Physical Systems. Office of Scientific and Technical Information (OSTI), September 2016. http://dx.doi.org/10.2172/1330190.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Hoffman, Wyatt. AI and the Future of Cyber Competition. Center for Security and Emerging Technology, January 2021. http://dx.doi.org/10.51593/2020ca007.

Full text
Abstract:
As states turn to AI to gain an edge in cyber competition, it will change the cat-and-mouse game between cyber attackers and defenders. Embracing machine learning systems for cyber defense could drive more aggressive and destabilizing engagements between states. Wyatt Hoffman writes that cyber competition already has the ingredients needed for escalation to real-world violence, even if these ingredients have yet to come together in the right conditions.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography