Multi-rate threshold FlipThem
From MaRDI portal
Publication:2167726
DOI10.1007/978-3-319-66399-9_10zbMath1500.94037OpenAlexW2740563980MaRDI QIDQ2167726
Nigel P. Smart, Chris Sherfield, David S. Leslie
Publication date: 25 August 2022
Full work available at URL: https://eprints.lancs.ac.uk/id/eprint/88425/1/611.pdf
Applications of game theory (91A80) Cryptography (94A60) Authentication, digital signatures and secret sharing (94A62)
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Decision and game theory for security. 7th international conference, GameSec 2016, New York, NY, USA, November 2--4, 2016. Proceedings
- \texttt{FlipIt}: the game of ``stealthy takeover
- Decision and game theory for security. 5th international conference, GameSec 2014, Los Angeles, CA, USA, November 6--7, 2014. Proceedings
- Learning mixed equilibria
- Decision and game theory for security. Third international conference, GameSec 2012, Budapest, Hungary, November 5--6, 2012. Proceedings
- Mixed equilibria and dynamical systems arising from fictitious play in perturbed games
- Generalised weakened fictitious play
- Non-cooperative games
- FlipThem: Modeling Targeted Attacks with FlipIt for Multiple Resources
- Mitigating Covert Compromises
- How to share a secret
- Deception-Based Game Theoretical Approach to Mitigate DoS Attacks
- Optimal and Game-Theoretic Deployment of Security Investments in Interdependent Assets
- Dynamics on Linear Influence Network Games Under Stochastic Environments
- Threshold FlipThem: When the Winner Does Not Need to Take All
- Are We Compromised? Modelling Security Assessment Games
- Defending against the Unknown Enemy: Applying FlipIt to System Security
- Topics in Cryptology – CT-RSA 2006
This page was built for publication: Multi-rate threshold FlipThem