Game theory meets network security and privacy

From MaRDI portal
Publication:2875114

DOI10.1145/2480741.2480742zbMath1293.91042OpenAlexW2067064328WikidataQ62783252 ScholiaQ62783252MaRDI QIDQ2875114

Quanyan Zhu, Tamer Bacşar, Mohammad Hossein Manshaei, Jean-Pierre Hubaux, Tansu Alpcan

Publication date: 13 August 2014

Published in: ACM Computing Surveys (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1145/2480741.2480742




Related Items (40)

Dynamic contract design for systemic cyber risk management of interdependent enterprise networksAn evidential game theory framework in multi-criteria decision making processDiscrete game-theoretic analysis of defense in correlated cyber-physical systemsSecure estimation based Kalman filter for cyber-physical systems against sensor attacksCyber-physical correlation effects in defense games for large discrete infrastructuresDynamics on Linear Influence Network Games Under Stochastic EnvironmentsAn effective rumor-containing strategyResilient Distributed Control of Multi-agent Cyber-Physical SystemsIncentive mechanism design for security investment with local exit equilibrium on structured populationsStochastic detection against deception attacks in CPS: performance evaluation and game-theoretic analysisA novel dynamic method in distributed network attack-defense gameMulti-resolution large population stochastic differential games and their application to demand response management in the smart gridAn insurance theory based optimal cyber-insurance contract against moral hazardData-injection attacks in stochastic control systems: detectability and performance tradeoffsAn iterative security game for computing robust and adaptive network flowsGraph-theoretic approaches for analyzing the resilience of distributed control systems: a tutorial and surveyAn optimal group decision-making approach for cyber security using improved selection-drift dynamicsComposite control of linear quadratic games in delta domain with disturbance observersA jointly optimal design of control and scheduling in networked systems under denial-of-service attacksHitting a path: a generalization of weighted connectivity via game theoryA game-theoretic security framework for quantum cryptography: performance analysis and applicationQuantum blockchain-enabled exchange protocol model for decentralized systemsGame theoretical security detection strategy for networked systemsA system-of-systems approach to strategic cyber-defense and robust switching control design for cyber-physical wind energy systemsCost-aware defense for parallel server systems against reliability and security failuresDynamic Games for Analyzing Competition in the Internet and in On-Line Social NetworksNon-zero-sum cooperative access control game model with user trust and permission riskSecurity games on matroidsStrategic sensor placement on graphsA supply chain network game theory model of cybersecurity investments with nonlinear budget constraintsMultifirm models of cybersecurity investment competition vs. cooperation and network vulnerabilityCybersecurity investments in the supply chain: coordination and a strategic attackerA hybrid stochastic game for secure control of cyber-physical systemsDynamic games in cyber-physical security: an overviewAn efficient dynamic allocation mechanism for security in networks of interdependent strategic agentsSecuring infrastructure facilities: when does proactive defense help?On the characterization of saddle point equilibrium for security games with additive utilityA resource-competitive jamming defenseTowards a Metric for Communication Network Vulnerability to Attacks: A Game Theoretic ApproachGame theoretic modeling and dependability analysis of small cell relays under bandwidth spoofing attack in 5G wireless communication network




This page was built for publication: Game theory meets network security and privacy