Information Sharing Among Cyber Hackers in Successive Attacks
From MaRDI portal
Publication:5269939
DOI10.1142/S0219198917500104zbMATH Open1391.91067MaRDI QIDQ5269939FDOQ5269939
Publication date: 28 June 2017
Published in: International Game Theory Review (Search for Journal in Brave)
game theoryasset allocationinformation sharingcontest success functionpolicycyber securitycyber warsecurity investment
Cited In (7)
- A two-period game theoretic model of zero-day attacks with stockpiling
- Title not available (Why is that?)
- Title not available (Why is that?)
- Information Security Strategies for Information-Sharing Firms Considering a Strategic Hacker
- Security investment, hacking, and information sharing between firms and between hackers
- Proactivity and Retroactivity of Firms and Information Sharing of Hackers
- Formation of stable and efficient social storage cloud
This page was built for publication: Information Sharing Among Cyber Hackers in Successive Attacks
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5269939)