Game theory on attack graph for cyber deception
From MaRDI portal
Publication:2056965
Recommendations
- Harnessing the power of deception in attack graph-based security games
- You only lie twice: a multi-round cyber deception game of questionable veracity
- Optimal placement of honeypots for network defense
- Game theory for cyber deception. From theory to applications
- Partially observable stochastic games for cyber deception against network epidemic
Cites work
- scientific article; zbMATH DE number 2013849 (Why is no real title available?)
- A game theoretic framework for software diversity for network security
- Approximate solutions for attack graph games with imperfect information
- Blocking adversarial influence in social networks
- Computing optimal randomized resource allocations for massive security games
- Decoy allocation games on graphs with temporal logic objectives
- Game theory and machine learning for cyber security
- Harnessing the power of deception in attack graph-based security games
- Honeypot Allocation Games over Attack Graphs for Cyber Deception
- New complexity results about Nash equilibria
- Partially observable stochastic games for cyber deception against network epidemic
- The Complexity of Markov Decision Processes
Cited in
(18)- Hypothesis testing game for cyber deception
- Modeling secrecy and deception in a multiple-period attacker-defender signaling game
- Deception in multi-attacker security game with nonfuzzy and fuzzy payoffs
- A two-stage deception game for network defense
- Game theory for cyber deception. From theory to applications
- You only lie twice: a multi-round cyber deception game of questionable veracity
- Using strategy objectives for network security analysis
- A game-theoretic analysis of deception over social networks using fake avatars
- Decoy allocation games on graphs with temporal logic objectives
- Exploiting bounded rationality in risk-based cyber camouflage games
- Harnessing the power of deception in attack graph-based security games
- Efficient defense decision-making approach for multistep attacks based on the attack graph and game theory
- Learning Generative Deception Strategies in Combinatorial Masking Games
- Approximate solutions for attack graph games with imperfect information
- Partially observable stochastic games for cyber deception against network epidemic
- scientific article; zbMATH DE number 2077655 (Why is no real title available?)
- Evaluating Adaptive Deception Strategies for Cyber Defense with Human Adversaries
- Optimal placement of honeypots for network defense
This page was built for publication: Game theory on attack graph for cyber deception
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2056965)