\texttt{FlipIt}: the game of ``stealthy takeover
From MaRDI portal
Publication:380966
DOI10.1007/S00145-012-9134-5zbMath1283.94089OpenAlexW2015787697MaRDI QIDQ380966
Marten van Dijk, Alina Oprea, Ari Juels, Ronald L. Rivest
Publication date: 15 November 2013
Published in: Journal of Cryptology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s00145-012-9134-5
Applications of game theory (91A80) Cryptography (94A60) Authentication, digital signatures and secret sharing (94A62)
Related Items (15)
Modeling multivariate cybersecurity risks ⋮ Dynamic contract design for systemic cyber risk management of interdependent enterprise networks ⋮ Security from the adversary's inertia-controlling convergence speed when playing mixed strategy equilibria ⋮ Optimal Thresholds for Anomaly-Based Intrusion Detection in Dynamical Environments ⋮ Multi-rate threshold FlipThem ⋮ Quantifying the security advantage of password expiration policies ⋮ A survey: when moving target defense meets game theory ⋮ Time-Dependent Strategies in Games of Timing ⋮ $$\mathsf {QFlip}$$ : An Adaptive Reinforcement Learning Strategy for the $$\mathsf {FlipIt}$$ Security Game ⋮ Cut-The-Rope: A Game of Stealthy Intrusion ⋮ Engineering secure self-adaptive systems with Bayesian games ⋮ Security games with insider threats ⋮ The positive impact of task familiarity, risk propensity, and need for cognition on observed timing decisions in a security game ⋮ Deep reinforcement learning for \textsf{FlipIt} security game ⋮ Economically Optimal Variable Tag Length Message Authentication
Cites Work
This page was built for publication: \texttt{FlipIt}: the game of ``stealthy takeover