Game theoretic model of strategic honeypot selection in computer networks
From MaRDI portal
Publication:4909438
Recommendations
- Optimal placement of honeypots for network defense
- Honeynet games: A game theoretic approach to defending network monitors
- An Attacker-Defender Game for Honeynets
- Об оптимальной конфигурации обманных систем в компьютерной сети предприятия
- Approximate solutions for attack graph games with imperfect information
Cited in
(15)- Using deception in Markov game to understand adversarial behaviors through a capture-the-flag environment
- Game theory and cyber defense
- A Game-Theoretical Approach for Finding Optimal Strategies in a Botnet Defense Model
- Deception-based game theoretical approach to mitigate DoS attacks
- Decoy allocation games on graphs with temporal logic objectives
- Learning hidden Markov models for linear Gaussian systems with applications to event-based state estimation
- Learning Generative Deception Strategies in Combinatorial Masking Games
- Attack and defense strategies in complex networks based on game theory
- Approximate solutions for attack graph games with imperfect information
- An Attacker-Defender Game for Honeynets
- Об оптимальной конфигурации обманных систем в компьютерной сети предприятия
- Optimal placement of honeypots for network defense
- When hackers err: the impacts of false positives on information security games
- Honeynet games: A game theoretic approach to defending network monitors
- Rationalization of detection of the multiple disorders
This page was built for publication: Game theoretic model of strategic honeypot selection in computer networks
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4909438)