Pages that link to "Item:Q2875114"
From MaRDI portal
The following pages link to Game theory meets network security and privacy (Q2875114):
Displaying 43 items.
- An evidential game theory framework in multi-criteria decision making process (Q278443) (← links)
- Multi-resolution large population stochastic differential games and their application to demand response management in the smart grid (Q367448) (← links)
- Security games on matroids (Q507326) (← links)
- A supply chain network game theory model of cybersecurity investments with nonlinear budget constraints (Q513575) (← links)
- Dynamic contract design for systemic cyber risk management of interdependent enterprise networks (Q823843) (← links)
- Discrete game-theoretic analysis of defense in correlated cyber-physical systems (Q827264) (← links)
- Secure estimation based Kalman filter for cyber-physical systems against sensor attacks (Q1626921) (← links)
- Cyber-physical correlation effects in defense games for large discrete infrastructures (Q1630471) (← links)
- A novel dynamic method in distributed network attack-defense game (Q1665444) (← links)
- Composite control of linear quadratic games in delta domain with disturbance observers (Q1691164) (← links)
- Non-zero-sum cooperative access control game model with user trust and permission risk (Q1736147) (← links)
- Multifirm models of cybersecurity investment competition vs. cooperation and network vulnerability (Q1753471) (← links)
- A hybrid stochastic game for secure control of cyber-physical systems (Q1796984) (← links)
- On the characterization of saddle point equilibrium for security games with additive utility (Q2056958) (← links)
- A resource-competitive jamming defense (Q2075623) (← links)
- An effective rumor-containing strategy (Q2150386) (← links)
- Incentive mechanism design for security investment with local exit equilibrium on structured populations (Q2162588) (← links)
- Stochastic detection against deception attacks in CPS: performance evaluation and game-theoretic analysis (Q2165949) (← links)
- Game theoretical security detection strategy for networked systems (Q2195399) (← links)
- Strategic sensor placement on graphs (Q2242964) (← links)
- Cybersecurity investments in the supply chain: coordination and a strategic attacker (Q2282501) (← links)
- Dynamic games in cyber-physical security: an overview (Q2292106) (← links)
- An efficient dynamic allocation mechanism for security in networks of interdependent strategic agents (Q2292109) (← links)
- Securing infrastructure facilities: when does proactive defense help? (Q2292114) (← links)
- Data-injection attacks in stochastic control systems: detectability and performance tradeoffs (Q2409156) (← links)
- Hitting a path: a generalization of weighted connectivity via game theory (Q2424795) (← links)
- An insurance theory based optimal cyber-insurance contract against moral hazard (Q2663526) (← links)
- An iterative security game for computing robust and adaptive network flows (Q2669664) (← links)
- A jointly optimal design of control and scheduling in networked systems under denial-of-service attacks (Q2682322) (← links)
- A game-theoretic security framework for quantum cryptography: performance analysis and application (Q2684305) (← links)
- Towards a Metric for Communication Network Vulnerability to Attacks: A Game Theoretic Approach (Q2840942) (← links)
- Resilient Distributed Control of Multi-agent Cyber-Physical Systems (Q2925514) (← links)
- Dynamics on Linear Influence Network Games Under Stochastic Environments (Q3179195) (← links)
- Dynamic Games for Analyzing Competition in the Internet and in On-Line Social Networks (Q4607259) (← links)
- Game theoretic modeling and dependability analysis of small cell relays under bandwidth spoofing attack in 5G wireless communication network (Q5003044) (← links)
- Graph-theoretic approaches for analyzing the resilience of distributed control systems: a tutorial and survey (Q6073106) (← links)
- An optimal group decision-making approach for cyber security using improved selection-drift dynamics (Q6078104) (← links)
- Quantum blockchain-enabled exchange protocol model for decentralized systems (Q6139235) (← links)
- Cost-aware defense for parallel server systems against reliability and security failures (Q6152586) (← links)
- Deterrence, backup, or insurance: game-theoretic modeling of ransomware (Q6555590) (← links)
- Generalized hyperbolic discounting in security games of timing (Q6555665) (← links)
- Security-aware optimal actuator placement in vehicle platooning (Q6578838) (← links)
- On the impossibility of surviving (iterated) deletion of weakly dominated strategies in rational MPC (Q6581796) (← links)