Defending against the unknown enemy: applying FlipIt to system security
DOI10.1007/978-3-642-34266-0_15zbMATH Open1283.94056OpenAlexW2230744892MaRDI QIDQ4909442FDOQ4909442
Authors: Kevin D. Bowers, Marten van Dijk, Robert Griffin, Ari Juels, Alina Oprea, Ronald L. Rivest, Nikos Triandopoulos
Publication date: 13 March 2013
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: http://hdl.handle.net/1721.1/90591
Recommendations
- \texttt{FlipIt}: the game of ``stealthy takeover
- FlipThem: modeling targeted attacks with FlipIt for multiple resources
- Threshold FlipThem: when the winner does not need to take all
- $$\mathsf {QFlip}$$ : An Adaptive Reinforcement Learning Strategy for the $$\mathsf {FlipIt}$$ Security Game
- Multi-rate threshold FlipThem
Applications of game theory (91A80) Cryptography (94A60) Authentication, digital signatures and secret sharing (94A62)
Cited In (9)
- Generalized hyperbolic discounting in security games of timing
- $$\mathsf {QFlip}$$ : An Adaptive Reinforcement Learning Strategy for the $$\mathsf {FlipIt}$$ Security Game
- Threshold FlipThem: when the winner does not need to take all
- Time-Dependent Strategies in Games of Timing
- Multi-rate threshold FlipThem
- Are we compromised? Modelling security assessment games
- FlipThem: modeling targeted attacks with FlipIt for multiple resources
- \texttt{FlipIt}: the game of ``stealthy takeover
- Cut-the-rope: a game of stealthy intrusion
This page was built for publication: Defending against the unknown enemy: applying FlipIt to system security
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4909442)