Of threats and costs: a game-theoretic approach to security risk management
From MaRDI portal
Publication:2997789
DOI10.1007/978-1-4419-0534-5_2zbMATH Open1216.90022OpenAlexW69782458MaRDI QIDQ2997789FDOQ2997789
Authors: Patrick Maillé, Peter Reichl, Bruno Tuffin
Publication date: 9 May 2011
Published in: Performance Models and Risk Management in Communications Systems (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-1-4419-0534-5_2
Recommendations
- Interplay between security providers, consumers, and attackers: a weighted congestion game approach
- Game theory for security and risk management. From theory to practice
- Network security. A decision and game-theoretic approach.
- Game theory meets network security and privacy
- Game theoretic risk analysis of security threats
Noncooperative games (91A10) Communication networks in operations research (90B18) Other game-theoretic models (91A40)
Cited In (7)
- An application of crypto cloud computing in social networks by cooperative game theory
- Game theoretic risk analysis of security threats
- Towards a game theoretic authorisation model
- Incentives and information security
- A game-theoretical and cryptographical approach to crypto-cloud computing and its economical and financial aspects
- Interplay between security providers, consumers, and attackers: a weighted congestion game approach
- Network security. A decision and game-theoretic approach.
This page was built for publication: Of threats and costs: a game-theoretic approach to security risk management
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2997789)