Game theory on attack graph for cyber deception
From MaRDI portal
Publication:2056965
DOI10.1007/978-3-030-64793-3_24zbMATH Open1484.91030OpenAlexW3114455162MaRDI QIDQ2056965FDOQ2056965
Authors: Ahmed H. Anwar, Charles A. Kamhoua
Publication date: 8 December 2021
Full work available at URL: https://doi.org/10.1007/978-3-030-64793-3_24
Recommendations
- Harnessing the power of deception in attack graph-based security games
- You only lie twice: a multi-round cyber deception game of questionable veracity
- Optimal placement of honeypots for network defense
- Game theory for cyber deception. From theory to applications
- Partially observable stochastic games for cyber deception against network epidemic
Noncooperative games (91A10) Stochastic games, stochastic differential games (91A15) Games involving graphs (91A43)
Cites Work
- Title not available (Why is that?)
- The Complexity of Markov Decision Processes
- New complexity results about Nash equilibria
- Computing optimal randomized resource allocations for massive security games
- Partially observable stochastic games for cyber deception against network epidemic
- Harnessing the power of deception in attack graph-based security games
- Decoy allocation games on graphs with temporal logic objectives
- Blocking adversarial influence in social networks
- A game theoretic framework for software diversity for network security
- Approximate solutions for attack graph games with imperfect information
- Honeypot Allocation Games over Attack Graphs for Cyber Deception
- Game Theory and Machine Learning for Cyber Security
Cited In (10)
- Modeling secrecy and deception in a multiple-period attacker-defender signaling game
- Hypothesis testing game for cyber deception
- Optimal placement of honeypots for network defense
- Approximate solutions for attack graph games with imperfect information
- A game-theoretic analysis of deception over social networks using fake avatars
- Title not available (Why is that?)
- A two-stage deception game for network defense
- Using strategy objectives for network security analysis
- Learning Generative Deception Strategies in Combinatorial Masking Games
- Evaluating Adaptive Deception Strategies for Cyber Defense with Human Adversaries
This page was built for publication: Game theory on attack graph for cyber deception
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2056965)