Of threats and costs: a game-theoretic approach to security risk management
From MaRDI portal
Publication:2997789
Recommendations
- Interplay between security providers, consumers, and attackers: a weighted congestion game approach
- Game theory for security and risk management. From theory to practice
- Network security. A decision and game-theoretic approach.
- Game theory meets network security and privacy
- Game theoretic risk analysis of security threats
Cited in
(12)- When the winning move is not to play: games of deterrence in cyber security
- Interplay between security providers, consumers, and attackers: a weighted congestion game approach
- A game-theoretical and cryptographical approach to crypto-cloud computing and its economical and financial aspects
- An application of crypto cloud computing in social networks by cooperative game theory
- Some game-theoretical models of information security problems
- Game theoretic risk analysis of security threats
- Game theoretic modeling and dependability analysis of small cell relays under bandwidth spoofing attack in 5G wireless communication network
- Game theory for security and risk management. From theory to practice
- Network security. A decision and game-theoretic approach.
- Non-zero-sum cooperative access control game model with user trust and permission risk
- Incentives and information security
- Towards a game theoretic authorisation model
This page was built for publication: Of threats and costs: a game-theoretic approach to security risk management
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2997789)