Are we compromised? Modelling security assessment games
From MaRDI portal
Publication:4909439
DOI10.1007/978-3-642-34266-0_14zbMATH Open1377.91051OpenAlexW51794740MaRDI QIDQ4909439FDOQ4909439
Authors:
Publication date: 13 March 2013
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-34266-0_14
Recommendations
Applications of game theory (91A80) Other game-theoretic models (91A40) Network design and communication in computer systems (68M10) Authentication, digital signatures and secret sharing (94A62)
Cited In (7)
- $$\mathsf {QFlip}$$ : An Adaptive Reinforcement Learning Strategy for the $$\mathsf {FlipIt}$$ Security Game
- Time-Dependent Strategies in Games of Timing
- Multi-rate threshold FlipThem
- Organizational vulnerability of digital threats: a first validation of an assessment method
- Risk assessment as an argumentation game
- The positive impact of task familiarity, risk propensity, and need for cognition on observed timing decisions in a security game
- Deep reinforcement learning for \textsf{FlipIt} security game
This page was built for publication: Are we compromised? Modelling security assessment games
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4909439)