A game-theoretic framework for network security vulnerability assessment and mitigation
From MaRDI portal
Publication:4909437
DOI10.1007/978-3-642-34266-0_11zbMATH Open1377.90013OpenAlexW9129034MaRDI QIDQ4909437FDOQ4909437
Authors: Assane Gueye, Vladimir Marbukh
Publication date: 13 March 2013
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-34266-0_11
Recommendations
- Towards a metric for communication network vulnerability to attacks: a game theoretic approach
- A supply chain game theory framework for cybersecurity investments under network vulnerability
- Network security. A decision and game-theoretic approach.
- Network topology vulnerability/cost trade-off: model, application, and computational complexity
- Using strategy objectives for network security analysis
Deterministic network models in operations research (90B10) Applications of game theory (91A80) Other game-theoretic models (91A40)
Cited In (19)
- Mitigating Covert Compromises
- Behavioral and Game-Theoretic Security Investments in Interdependent Systems Modeled by Attack Graphs
- Game theoretical security detection strategy for networked systems
- Toward a Theory of Vulnerability Disclosure Policy: A Hacker’s Game
- Node Capture Games: A Game Theoretic Approach to Modeling and Mitigating Node Capture Attacks
- Sustainability of information security investment in online social networks: an evolutionary game-theoretic approach
- Towards a metric for communication network vulnerability to attacks: a game theoretic approach
- Vulnerability analysis of CSP based on stochastic game theory
- An iterative security game for computing robust and adaptive network flows
- A game theoretic framework for software diversity for network security
- The critical node game
- Interdependent Security Games on Networks Under Behavioral Probability Weighting
- Network topology vulnerability/cost trade-off: model, application, and computational complexity
- Using strategy objectives for network security analysis
- Game theory meets network security and privacy
- Probability Distributions on Partially Ordered Sets and Network Interdiction Games
- Graph-theoretic approaches for analyzing the resilience of distributed control systems: a tutorial and survey
- A study of network violator interception based on a reliable game model
- Network security. A decision and game-theoretic approach.
This page was built for publication: A game-theoretic framework for network security vulnerability assessment and mitigation
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4909437)