Harnessing the power of deception in attack graph-based security games
From MaRDI portal
Recommendations
- Game theory on attack graph for cyber deception
- scientific article; zbMATH DE number 7368358
- Learning Generative Deception Strategies in Combinatorial Masking Games
- Approximate solutions for attack graph games with imperfect information
- Deception in multi-attacker security game with nonfuzzy and fuzzy payoffs
Cites work
- scientific article; zbMATH DE number 3150484 (Why is no real title available?)
- A Unified Continuous Greedy Algorithm for Submodular Maximization
- Approximate solutions for attack graph games with imperfect information
- Behavioral and Game-Theoretic Security Investments in Interdependent Systems Modeled by Attack Graphs
- Complexity of constructing solutions in the core based on synergies among coalitions
- Differential evolution -- a simple and efficient heuristic for global optimization over continuous spaces
- Honeypot Allocation Games over Attack Graphs for Cyber Deception
- Neural architecture search: a survey
- Quantal response equilibria for normal form games
- Security and Game Theory
Cited in
(21)- Casino rationale: countering attacker deception in zero-sum Stackelberg security games of bounded rationality
- Mitigating Covert Compromises
- Modeling secrecy and deception in a multiple-period attacker-defender signaling game
- Behavioral and Game-Theoretic Security Investments in Interdependent Systems Modeled by Attack Graphs
- Learning Machiavellian strategies for manipulation in Stackelberg security games
- Adversarial Attacks on Continuous Authentication Security: A Dynamic Game Approach
- Hypothesis testing game for cyber deception
- Deception in multi-attacker security game with nonfuzzy and fuzzy payoffs
- scientific article; zbMATH DE number 7368358 (Why is no real title available?)
- Approximate solutions for attack graph games with imperfect information
- Decoy allocation games on graphs with temporal logic objectives
- Exploiting bounded rationality in risk-based cyber camouflage games
- Game theory on attack graph for cyber deception
- A game-theoretic analysis of deception over social networks using fake avatars
- A two-stage deception game for network defense
- Decoding the imitation security game: handling attacker imitative behavior deception
- Deception tactics for network interdiction: a multiobjective approach
- Learning Generative Deception Strategies in Combinatorial Masking Games
- Evaluating Adaptive Deception Strategies for Cyber Defense with Human Adversaries
- Risk-Distortion Analysis for Video Collusion Attacks: A Mouse-and-Cat Game
- You only lie twice: a multi-round cyber deception game of questionable veracity
This page was built for publication: Harnessing the power of deception in attack graph-based security games
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2056942)