Computer Science, Engineering and Systems Publications List Information Warfare, Hypergames, Systems Research Ad Hoc Networking Research Computer Architecture Research - Password Capability Systems Industry Publications Industry Hardware Design Projects Interesting Papers Photo Galleries Biography Email Carlo GOTO Home

Last Updated: Mon Aug 4 05:36:56 UTC 2014


Information Theory Research
(Currently Active)

Information Theory, Strategy,
Hypergames,
Social Systems, Biological Systems, Cognitive Cycles



Introduction

The four canonical strategies of deception provide a rigorous and mathematically supportable theoretical basis for the analysis of a wide range of problems involving deceptions and other forms of manipulating information in survival contests. These strategies, rooted in Shannon's information theory and game theory, have been shown to provide a robust model for dealing with problems spanning biological, social,  computing and other systems.

Hypergames are meta-games which permit modelling of deception and misperception. This area of research has been largely dormant since the 1980s. Current research involves exploration of the utility of hypergames in modelling social systems, biological systems and the evolutionary implications of hypergames.

Large social systems such often exhibit unusually complex behaviours. Historical models for the latter include Lanchester's exchange rate equations, or the application of Metcalfe's Law to the modelling of networked systems.

Further basic research is needed to fully quantify the properties of such systems.



Deception in Biology: Nature's Exploitation of Information to Win Survival Contests









Legacy Infowar Teaching Materials (2000-2006)


An Quantitative Introductory Course in Information Warfare
[Honours Advanced Module CSE 468 Information Conflict Semester 1 2006]

Topic Schedule:

Lecture Number
Lecture
Topic
1
Introduction and overview - Lecture Notes
2
Shannon's information theory concepts - Lecture Notes
3
Basic game theory concepts - Lecture Notes
4
Four canonical strategies of information conflict vs Shannon's information theory - Lecture Notes
5
Compound information conflict strategies and using graphs to model these - Lecture Notes
6
Hypergames vs information conflict strategies - Lecture Notes
7
Evolutionary nature of information conflict and biological examples - Lecture Notes
8
Forms of information conflict, Class I, II, III, IV info rmation warfare, denial of service attack classification; Analysis and modelling of information conflict attacks and techniques - Lecture Notes
9
Classical deception techniques, perception management, propaganda, advertising - Lecture Notes
10
Information conflict vs copyright, privacy, spam, espionage, surveillance,hacking and cyberwar, viruses/worms, and identity theft - Lecture Notes
11
Information conflict vs basic concepts and risks in computer security and encryption - Lecture Notes
12
Problems arising in law enforcement and organisational security due to the proliferation of information conflict techniques - Lecture Notes
13
Revision - Lecture Notes


Theses and Projects


Lachlan Brumley, HYPANT: A Hypergame Analysis Tool, Honours Thesis, 2003, Monash University SCSSE (Website).

HYPANT is a hypergame simulator which implements the Fraser-Hipel algorithm for hypergame analysis. The tool was implemented with the aim of producing a GPL code package suitable for use in more ambitious projects.

Lachlan Brumley, PhD Project  (Website).












Computer Science, Engineering and Systems Publications List Information Warfare, Hypergames, Systems Research Ad Hoc Networking Research Computer Architecture Research - Password Capability Systems Industry Publications Industry Hardware Design Projects Interesting Papers Photo Galleries Biography Email Carlo GOTO Home
Artwork and text 1994 - 2010 Carlo Kopp; All rights reserved.
$Revision: 2.276 $