Information sharing among cyber hackers in successive attacks
From MaRDI portal
Publication:5269939
Recommendations
- Security investment, hacking, and information sharing between firms and between hackers
- Proactivity and retroactivity of firms and information sharing of hackers
- Information security investment for competitive firms with hacker behavior and security requirements
- Information security investment when hackers disseminate knowledge
- Optimal policies for information sharing in information system security
Cited in
(7)- scientific article; zbMATH DE number 5775555 (Why is no real title available?)
- Security investment, hacking, and information sharing between firms and between hackers
- scientific article; zbMATH DE number 2030045 (Why is no real title available?)
- A two-period game theoretic model of zero-day attacks with stockpiling
- Proactivity and retroactivity of firms and information sharing of hackers
- Information Security Strategies for Information-Sharing Firms Considering a Strategic Hacker
- Formation of stable and efficient social storage cloud
This page was built for publication: Information sharing among cyber hackers in successive attacks
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5269939)