1990
DOI: 10.1109/21.47820
|View full text |Cite
|
Sign up to set email alerts
|

An architecture for adversarial planning

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
16
0

Year Published

1999
1999
2020
2020

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 31 publications
(18 citation statements)
references
References 14 publications
0
16
0
Order By: Relevance
“…Prominent among approaches with specific emphasis on adversarial actions is Adversarial Planner (AP)-a state-based, application-independent, hierarchical-task-network planner [23]. Its adversarial reasoning process models the Army's action-reactioncounteraction COA planning protocol.…”
Section: Possible Approaches Criteria and Tradeoffsmentioning
confidence: 99%
“…Prominent among approaches with specific emphasis on adversarial actions is Adversarial Planner (AP)-a state-based, application-independent, hierarchical-task-network planner [23]. Its adversarial reasoning process models the Army's action-reactioncounteraction COA planning protocol.…”
Section: Possible Approaches Criteria and Tradeoffsmentioning
confidence: 99%
“…In 1981, Jaime G. Carbonell, a famous professor in CarnegieMellon University, developed an approach to reasoning about adversarial behaviour called "counterplanning" that maintains a strategic view of plan conflicts [6]. In 1990, Carol Applegate provided an architecture for adversarial planning [7].…”
Section: Introductionmentioning
confidence: 99%
“…Some good work has developed honeypot computers and "honeynets", computer systems and networks whose purpose is to entrap attackers to obtain information about their attack methods [18]; these are a simple passive form of deception. [1] suggests a general approach to planning defenses automatically in adversarial situations, including classic military tactics like deception; [8] suggests ways to encourage maladaptive behavior in enemy organizations. [10] and [19] provide ideas for modeling attacks on computer systems, the former suggesting some interesting ideas about deception in defense.…”
Section: Introductionmentioning
confidence: 99%