E-Thesis 305 views 114 downloads
Computable Analysis and Game Theory: From Foundations to Applications / TONICHA CROOK
Swansea University Author: TONICHA CROOK
DOI (Published version): 10.23889/SUThesis.67150
Abstract
This body of research showcases several facets of the intersection between computer science and game theory. On the foundational side, we explore the obstructions to the computability of Nash equilibria in the setting of computable analysis. In particular, we study the Weihrauch degree of the proble...
Published: |
Swansea University, Wales, UK
2024
|
---|---|
Institution: | Swansea University |
Degree level: | Doctoral |
Degree name: | Ph.D |
Supervisor: | Pauly, A |
URI: | https://cronfa.swan.ac.uk/Record/cronfa67150 |
first_indexed |
2024-07-18T11:44:00Z |
---|---|
last_indexed |
2024-11-25T14:19:35Z |
id |
cronfa67150 |
recordtype |
RisThesis |
fullrecord |
<?xml version="1.0"?><rfc1807><datestamp>2024-07-18T12:48:18.3287550</datestamp><bib-version>v2</bib-version><id>67150</id><entry>2024-07-18</entry><title>Computable Analysis and Game Theory: From Foundations to Applications</title><swanseaauthors><author><sid>48d905c96d1bad1a0081a07096a6f911</sid><firstname>TONICHA</firstname><surname>CROOK</surname><name>TONICHA CROOK</name><active>true</active><ethesisStudent>false</ethesisStudent></author></swanseaauthors><date>2024-07-18</date><abstract>This body of research showcases several facets of the intersection between computer science and game theory. On the foundational side, we explore the obstructions to the computability of Nash equilibria in the setting of computable analysis. In particular, we study the Weihrauch degree of the problem of finding a Nash equilibrium for a multiplayer game in normal form. We conclude that the Weihrauch degree Nash for multiplayer games lies between AoUC∗[0,1] and AoUC⋄[0,1] (Theorem 5.3). As a slight detour, we also explore the demarcation between computable and non-computable computational problems pertaining to the verification of machine learning. We demonstrate that many verification questions are computable without the need to specify a machine learning framework (Section 7.2). As well as looking into the theory of learners, robustness and sparisty of training data. On the application side, we study the use of Hypergames in Cybersecurity. We look into cybersecurity AND/OR attack graphs and how we could turn them into a hypergame (8.1). Hyper Nash equilibria is not an ideal solution for these games, however, we propose a regret-minimisation based solution concept. In Section 8.2, we survey the area of Hypergames and their connection to cybersecurity, showing that even if there is a small overlap, the reach is limited. We suggest new research directions such as adaptive games, generalisation and transferability (Section 8.3).</abstract><type>E-Thesis</type><journal/><volume/><journalNumber/><paginationStart/><paginationEnd/><publisher/><placeOfPublication>Swansea University, Wales, UK</placeOfPublication><isbnPrint/><isbnElectronic/><issnPrint/><issnElectronic/><keywords>Game Theory, Computable Analysis, Hypergames, Cybersecurity, Machine Learning</keywords><publishedDay>3</publishedDay><publishedMonth>7</publishedMonth><publishedYear>2024</publishedYear><publishedDate>2024-07-03</publishedDate><doi>10.23889/SUThesis.67150</doi><url/><notes>A selection of content is redacted or is partially redacted from this thesis to protect sensitive and personal information.</notes><college>COLLEGE NANME</college><CollegeCode>COLLEGE CODE</CollegeCode><institution>Swansea University</institution><supervisor>Pauly, A</supervisor><degreelevel>Doctoral</degreelevel><degreename>Ph.D</degreename><degreesponsorsfunders>AIMLAC CDT</degreesponsorsfunders><apcterm/><funders>AIMLAC CDT</funders><projectreference/><lastEdited>2024-07-18T12:48:18.3287550</lastEdited><Created>2024-07-18T12:37:35.2097171</Created><path><level id="1">Faculty of Science and Engineering</level><level id="2">School of Mathematics and Computer Science - Computer Science</level></path><authors><author><firstname>TONICHA</firstname><surname>CROOK</surname><order>1</order></author></authors><documents><document><filename>67150__30927__8a941012a9b14641bf638f8dc93992a4.pdf</filename><originalFilename>2024_Crook_T.final.67150.pdf</originalFilename><uploaded>2024-07-18T12:42:51.2892619</uploaded><type>Output</type><contentLength>2159333</contentLength><contentType>application/pdf</contentType><version>E-Thesis – open access</version><cronfaStatus>true</cronfaStatus><documentNotes>Copyright: The Author, Tonicha Crook, 2024</documentNotes><copyrightCorrect>true</copyrightCorrect><language>eng</language></document></documents><OutputDurs/></rfc1807> |
spelling |
2024-07-18T12:48:18.3287550 v2 67150 2024-07-18 Computable Analysis and Game Theory: From Foundations to Applications 48d905c96d1bad1a0081a07096a6f911 TONICHA CROOK TONICHA CROOK true false 2024-07-18 This body of research showcases several facets of the intersection between computer science and game theory. On the foundational side, we explore the obstructions to the computability of Nash equilibria in the setting of computable analysis. In particular, we study the Weihrauch degree of the problem of finding a Nash equilibrium for a multiplayer game in normal form. We conclude that the Weihrauch degree Nash for multiplayer games lies between AoUC∗[0,1] and AoUC⋄[0,1] (Theorem 5.3). As a slight detour, we also explore the demarcation between computable and non-computable computational problems pertaining to the verification of machine learning. We demonstrate that many verification questions are computable without the need to specify a machine learning framework (Section 7.2). As well as looking into the theory of learners, robustness and sparisty of training data. On the application side, we study the use of Hypergames in Cybersecurity. We look into cybersecurity AND/OR attack graphs and how we could turn them into a hypergame (8.1). Hyper Nash equilibria is not an ideal solution for these games, however, we propose a regret-minimisation based solution concept. In Section 8.2, we survey the area of Hypergames and their connection to cybersecurity, showing that even if there is a small overlap, the reach is limited. We suggest new research directions such as adaptive games, generalisation and transferability (Section 8.3). E-Thesis Swansea University, Wales, UK Game Theory, Computable Analysis, Hypergames, Cybersecurity, Machine Learning 3 7 2024 2024-07-03 10.23889/SUThesis.67150 A selection of content is redacted or is partially redacted from this thesis to protect sensitive and personal information. COLLEGE NANME COLLEGE CODE Swansea University Pauly, A Doctoral Ph.D AIMLAC CDT AIMLAC CDT 2024-07-18T12:48:18.3287550 2024-07-18T12:37:35.2097171 Faculty of Science and Engineering School of Mathematics and Computer Science - Computer Science TONICHA CROOK 1 67150__30927__8a941012a9b14641bf638f8dc93992a4.pdf 2024_Crook_T.final.67150.pdf 2024-07-18T12:42:51.2892619 Output 2159333 application/pdf E-Thesis – open access true Copyright: The Author, Tonicha Crook, 2024 true eng |
title |
Computable Analysis and Game Theory: From Foundations to Applications |
spellingShingle |
Computable Analysis and Game Theory: From Foundations to Applications TONICHA CROOK |
title_short |
Computable Analysis and Game Theory: From Foundations to Applications |
title_full |
Computable Analysis and Game Theory: From Foundations to Applications |
title_fullStr |
Computable Analysis and Game Theory: From Foundations to Applications |
title_full_unstemmed |
Computable Analysis and Game Theory: From Foundations to Applications |
title_sort |
Computable Analysis and Game Theory: From Foundations to Applications |
author_id_str_mv |
48d905c96d1bad1a0081a07096a6f911 |
author_id_fullname_str_mv |
48d905c96d1bad1a0081a07096a6f911_***_TONICHA CROOK |
author |
TONICHA CROOK |
author2 |
TONICHA CROOK |
format |
E-Thesis |
publishDate |
2024 |
institution |
Swansea University |
doi_str_mv |
10.23889/SUThesis.67150 |
college_str |
Faculty of Science and Engineering |
hierarchytype |
|
hierarchy_top_id |
facultyofscienceandengineering |
hierarchy_top_title |
Faculty of Science and Engineering |
hierarchy_parent_id |
facultyofscienceandengineering |
hierarchy_parent_title |
Faculty of Science and Engineering |
department_str |
School of Mathematics and Computer Science - Computer Science{{{_:::_}}}Faculty of Science and Engineering{{{_:::_}}}School of Mathematics and Computer Science - Computer Science |
document_store_str |
1 |
active_str |
0 |
description |
This body of research showcases several facets of the intersection between computer science and game theory. On the foundational side, we explore the obstructions to the computability of Nash equilibria in the setting of computable analysis. In particular, we study the Weihrauch degree of the problem of finding a Nash equilibrium for a multiplayer game in normal form. We conclude that the Weihrauch degree Nash for multiplayer games lies between AoUC∗[0,1] and AoUC⋄[0,1] (Theorem 5.3). As a slight detour, we also explore the demarcation between computable and non-computable computational problems pertaining to the verification of machine learning. We demonstrate that many verification questions are computable without the need to specify a machine learning framework (Section 7.2). As well as looking into the theory of learners, robustness and sparisty of training data. On the application side, we study the use of Hypergames in Cybersecurity. We look into cybersecurity AND/OR attack graphs and how we could turn them into a hypergame (8.1). Hyper Nash equilibria is not an ideal solution for these games, however, we propose a regret-minimisation based solution concept. In Section 8.2, we survey the area of Hypergames and their connection to cybersecurity, showing that even if there is a small overlap, the reach is limited. We suggest new research directions such as adaptive games, generalisation and transferability (Section 8.3). |
published_date |
2024-07-03T08:18:47Z |
_version_ |
1828908566903259136 |
score |
11.056959 |