"Game Theory Based Network Security"
written by Yi Luo, Ferenc Szidarovszky, Youssif Al-Nashif, Salim Hariri,
published by Journal of Information Security, Vol.1 No.1, 2010
has been cited by the following article(s):
  • Google Scholar
  • CrossRef
[1] Dynamic Games in Cyber-Physical Security: An Overview
2019
[2] Toward realizing self-protecting healthcare information systems: Design and security challenges
2019
[3] Automotive Cybersecurity
2019
[4] Machine Learning Methods for Network Intrusion Detection and Intrusion Prevention Systems
2018
[5] Autonomous Computer Security Game: Techniques, Strategy and Investigation
2018
[6] Game Theory based Attack Graph Analysis for Cyber War Strategy
2018
[7] Utilizing a Game Theoretical Approach to Prevent Collusion and Incentivize Cooperation in Cybersecurity Contexts
ProQuest Dissertations Publishing, 2017
[8] An Evolutionary Approach of Attack Graphs and Attack Trees: A Survey of Attack Modeling
2017
[9] How Shall We Play a Game?: A Game-theoretical Model for Cyber-warfare Games
2017
[10] A Markov game privacy preserving model in retail applications
IEEE MowNet 2017, International conference on selected topics in Mobile and Wireless Networking, 2017
[11] Attacks and defenses in mobile ip: Modeling with stochastic game petri net
arXiv preprint, 2017
[12] How Shall We Play a Game?
IEEE 30th Computer Security Foundations Symposium (CSF), 2017
[13] An Evolutionary Approach of Attack Graph to Attack Tree Conversion
2017
[14] Dynamic Game Theories in Cyber Security
2016
[15] Factors Influencing the Adoption of Intelligence, Surveillance, and Reconnaissance Technology by Collection Managers
ProQuest Dissertations Publishing, 2016
[16] Game‐Theoretic Computing in Cyber‐Risk
Cyber-Risk Informatics: Engineering Evaluation with Data Science, 2016
[17] A Survey of Game Theoretic Approaches to Modelling Decision-Making in Information Warfare Scenarios
Future Internet, 2016
[18] Propagating mixed uncertainties in cyber attacker payoffs: Exploration of two-phase Monte Carlo sampling and probability bounds analysis
2016
[19] Optimization of rootkit revealing system resources–A game theoretic approach
Journal of King Saud University-Computer and Information Sciences, 2015
[20] Quantifying mixed uncertainties in cyber attacker payoffs
Technologies for Homeland Security (HST), 2015 IEEE International Symposium on, 2015
[21] HackAttack: Game-Theoretic Analysis of Realistic Cyber Conflicts
arXiv preprint arXiv:1511.04389, 2015
[22] Informatikai algoritmusok. 2. kötet. Párhuzamos módszerek és optimalizáció
2014
[23] A study of adaptive learning for educational game design
ProQuest Dissertations Publishing, 2014
[24] Reinforcement learning algorithms for adaptive cyber defense against Heartbleed
Proceedings of the First ACM Workshop on Moving Target Defense. ACM, 2014
[25] A multiresolution approach for optimal defense against random attacks
International Journal of Information Security, 2014
[26] A Model-based Validated Autonomic Approach to Self-Protect Computing Systems
Q Chen, S Abdelwahed, A Erradi - ieeexplore.ieee.org, 2014
[27] A game-theory analysis of the rat-group attack in smart grids
Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP), 2014 IEEE Ninth International Conference on. IEEE, 2014
[28] Model-based autonomic security management of networked distributed systems
ProQuest Dissertations Publishing, 2014
[29] Game Theory and Information Security
2014
[30] Game theory for network security
Communications Surveys & Tutorials, IEEE, 2013
[31] Game‐theoretic computing in risk analysis
Wiley Interdisciplinary Reviews: Computational Statistics, 2012
[32] Using Signaling Games to Model the Multi-step Attack-Defense Scenarios on Confidentiality
Decision and Game Theory for Security, 2012
[33] Decision support using deterministic equivalents of probabilistic game trees
Engineering of Computer Based Systems (ECBS), 2012 IEEE 19th International Conference and Workshops on. IEEE, 2012
[34] An Evolutionary Game Theory Approach for Intelligent Patrolling
Procedia Computer Science, 2012
[35] Vulnerability assessment of a food supply chain to an intentional attack
Homeland Security (HST), 2012 IEEE Conference on Technologies for. IEEE, 2012
[36] Using Signaling Games to Model the Multi-step Attack-Defense Scenarios on Confidentiality.
GameSec: International Conference on Decision and Game Theory for Security, 2012
[37] On optimal strategies in protecting computer networks
Computer Systems and Applications (AICCSA), 2011 9th IEEE/ACS International Conference on. IEEE, 2011