Information sharing among cyber hackers in successive attacks
From MaRDI portal
Publication:5269939
DOI10.1142/S0219198917500104zbMATH Open1391.91067MaRDI QIDQ5269939FDOQ5269939
Authors: Kjell Hausken
Publication date: 28 June 2017
Published in: International Game Theory Review (Search for Journal in Brave)
Recommendations
- Security investment, hacking, and information sharing between firms and between hackers
- Proactivity and retroactivity of firms and information sharing of hackers
- Information security investment for competitive firms with hacker behavior and security requirements
- Information security investment when hackers disseminate knowledge
- Optimal policies for information sharing in information system security
game theoryasset allocationinformation sharingcontest success functionpolicycyber securitycyber warsecurity investment
Cited In (7)
- Proactivity and retroactivity of firms and information sharing of hackers
- A two-period game theoretic model of zero-day attacks with stockpiling
- Title not available (Why is that?)
- Title not available (Why is that?)
- Information Security Strategies for Information-Sharing Firms Considering a Strategic Hacker
- Security investment, hacking, and information sharing between firms and between hackers
- Formation of stable and efficient social storage cloud
This page was built for publication: Information sharing among cyber hackers in successive attacks
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5269939)