A game-theoretic framework for network security vulnerability assessment and mitigation
From MaRDI portal
Publication:4909437
Recommendations
- Towards a metric for communication network vulnerability to attacks: a game theoretic approach
- A supply chain game theory framework for cybersecurity investments under network vulnerability
- Network security. A decision and game-theoretic approach.
- Network topology vulnerability/cost trade-off: model, application, and computational complexity
- Using strategy objectives for network security analysis
Cited in
(19)- Network security. A decision and game-theoretic approach.
- Mitigating Covert Compromises
- Game theoretical security detection strategy for networked systems
- Behavioral and Game-Theoretic Security Investments in Interdependent Systems Modeled by Attack Graphs
- Toward a Theory of Vulnerability Disclosure Policy: A Hacker’s Game
- Node Capture Games: A Game Theoretic Approach to Modeling and Mitigating Node Capture Attacks
- Sustainability of information security investment in online social networks: an evolutionary game-theoretic approach
- Towards a metric for communication network vulnerability to attacks: a game theoretic approach
- Vulnerability analysis of CSP based on stochastic game theory
- An iterative security game for computing robust and adaptive network flows
- A game theoretic framework for software diversity for network security
- The critical node game
- Interdependent Security Games on Networks Under Behavioral Probability Weighting
- Using strategy objectives for network security analysis
- Network topology vulnerability/cost trade-off: model, application, and computational complexity
- Game theory meets network security and privacy
- Probability Distributions on Partially Ordered Sets and Network Interdiction Games
- Graph-theoretic approaches for analyzing the resilience of distributed control systems: a tutorial and survey
- A study of network violator interception based on a reliable game model
This page was built for publication: A game-theoretic framework for network security vulnerability assessment and mitigation
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4909437)