[1]
|
Trapped in Transparency: Analyzing the Effectiveness of Security Defenses in Real-World Scenarios
|
|
2022 |
|
|
[2]
|
A Physical-Layer Security Approach for IoT Against Jamming Interference Attacks
|
|
2021 IEEE Canadian Conference on …,
2021 |
|
|
[3]
|
Information Security Games: A Survey
|
|
2021 |
|
|
[4]
|
A Novel Multi Optimization Based Genetic Algorithm for Network Security
|
|
2021 |
|
|
[5]
|
A memory-based game-theoretic defensive approach for digital forensic investigators
|
|
Forensic Science International …,
2021 |
|
|
[6]
|
A Review on Defense Strategy Security Mechanism for Sensor Network
|
|
Smart Sensor Networks Using AI for …,
2021 |
|
|
[7]
|
The Development of a Model of the Formation of Cybersecurity Outlines Based on Multi Criteria Optimization and Game Theory
|
|
2020 |
|
|
[8]
|
Adversarial detection games in network security applications with imperfect and incomplete information
|
|
2020 |
|
|
[9]
|
A survey and research challenges of anti-forensics: Evaluation of game-theoretic models in simulation of forensic agents' behaviour
|
|
2020 |
|
|
[10]
|
Toward realizing self-protecting healthcare information systems: Design and security challenges
|
|
2019 |
|
|
[11]
|
Automotive Cybersecurity
|
|
2019 |
|
|
[12]
|
Dynamic Games in Cyber-Physical Security: An Overview
|
|
2019 |
|
|
[13]
|
Machine Learning Methods for Network Intrusion Detection and Intrusion Prevention Systems
|
|
2018 |
|
|
[14]
|
Autonomous Computer Security Game: Techniques, Strategy and Investigation
|
|
2018 |
|
|
[15]
|
Game Theory based Attack Graph Analysis for Cyber War Strategy
|
|
2018 |
|
|
[16]
|
Development of cybersecurity mandate for Indian oil and gas industry
|
|
2018 |
|
|
[17]
|
Utilizing a Game Theoretical Approach to Prevent Collusion and Incentivize Cooperation in Cybersecurity Contexts
|
|
ProQuest Dissertations Publishing,
2017 |
|
|
[18]
|
An Evolutionary Approach of Attack Graphs and Attack Trees: A Survey of Attack Modeling
|
|
2017 |
|
|
[19]
|
How Shall We Play a Game?: A Game-theoretical Model for Cyber-warfare Games
|
|
2017 |
|
|
[20]
|
A Markov game privacy preserving model in retail applications
|
|
IEEE MowNet 2017, International conference on selected topics in Mobile and Wireless Networking,
2017 |
|
|
[21]
|
Attacks and defenses in mobile ip: Modeling with stochastic game petri net
|
|
arXiv preprint,
2017 |
|
|
[22]
|
How Shall We Play a Game?
|
|
IEEE 30th Computer Security Foundations Symposium (CSF),
2017 |
|
|
[23]
|
An Evolutionary Approach of Attack Graph to Attack Tree Conversion
|
|
2017 |
|
|
[24]
|
Dynamic Game Theories in Cyber Security
|
|
2016 |
|
|
[25]
|
Factors Influencing the Adoption of Intelligence, Surveillance, and Reconnaissance Technology by Collection Managers
|
|
ProQuest Dissertations Publishing,
2016 |
|
|
[26]
|
Game‐Theoretic Computing in Cyber‐Risk
|
|
Cyber-Risk Informatics: Engineering Evaluation with Data Science,
2016 |
|
|
[27]
|
A Survey of Game Theoretic Approaches to Modelling Decision-Making in Information Warfare Scenarios
|
|
Future Internet,
2016 |
|
|
[28]
|
Propagating mixed uncertainties in cyber attacker payoffs: Exploration of two-phase Monte Carlo sampling and probability bounds analysis
|
|
2016 |
|
|
[29]
|
Optimization of rootkit revealing system resources–A game theoretic approach
|
|
Journal of King Saud University-Computer and Information Sciences,
2015 |
|
|
[30]
|
Quantifying mixed uncertainties in cyber attacker payoffs
|
|
Technologies for Homeland Security (HST), 2015 IEEE International Symposium on,
2015 |
|
|
[31]
|
HackAttack: Game-Theoretic Analysis of Realistic Cyber Conflicts
|
|
arXiv preprint arXiv:1511.04389,
2015 |
|
|
[32]
|
Constituents of the domain specific cyber security mandate for the Indian power sector
|
|
2015 |
|
|
[33]
|
Informatikai algoritmusok 2.
|
|
2015 |
|
|
[34]
|
Informatikai algoritmusok. 2. kötet. Párhuzamos módszerek és optimalizáció
|
|
2014 |
|
|
[35]
|
A study of adaptive learning for educational game design
|
|
ProQuest Dissertations Publishing,
2014 |
|
|
[36]
|
Reinforcement learning algorithms for adaptive cyber defense against Heartbleed
|
|
Proceedings of the First ACM Workshop on Moving Target Defense. ACM,
2014 |
|
|
[37]
|
A multiresolution approach for optimal defense against random attacks
|
|
International Journal of Information Security,
2014 |
|
|
[38]
|
A Model-based Validated Autonomic Approach to Self-Protect Computing Systems
|
|
Q Chen, S Abdelwahed, A Erradi - ieeexplore.ieee.org,
2014 |
|
|
[39]
|
A game-theory analysis of the rat-group attack in smart grids
|
|
Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP), 2014 IEEE Ninth International Conference on. IEEE,
2014 |
|
|
[40]
|
Model-based autonomic security management of networked distributed systems
|
|
ProQuest Dissertations Publishing,
2014 |
|
|
[41]
|
Game Theory and Information Security
|
|
2014 |
|
|
[42]
|
Game theory for network security
|
|
Communications Surveys & Tutorials, IEEE,
2013 |
|
|
[43]
|
Game‐theoretic computing in risk analysis
|
|
Wiley Interdisciplinary Reviews: Computational Statistics,
2012 |
|
|
[44]
|
Using Signaling Games to Model the Multi-step Attack-Defense Scenarios on Confidentiality
|
|
Decision and Game Theory for Security,
2012 |
|
|
[45]
|
Decision support using deterministic equivalents of probabilistic game trees
|
|
Engineering of Computer Based Systems (ECBS), 2012 IEEE 19th International Conference and Workshops on. IEEE,
2012 |
|
|
[46]
|
An Evolutionary Game Theory Approach for Intelligent Patrolling
|
|
Procedia Computer Science,
2012 |
|
|
[47]
|
Vulnerability assessment of a food supply chain to an intentional attack
|
|
Homeland Security (HST), 2012 IEEE Conference on Technologies for. IEEE,
2012 |
|
|
[48]
|
Using Signaling Games to Model the Multi-step Attack-Defense Scenarios on Confidentiality.
|
|
GameSec: International Conference on Decision and Game Theory for Security,
2012 |
|
|
[49]
|
New multi-objective evolutionary game theory algorithm for border security
|
|
2012 |
|
|
[50]
|
On optimal strategies in protecting computer networks
|
|
Computer Systems and Applications (AICCSA), 2011 9th IEEE/ACS International Conference on. IEEE,
2011 |
|
|
[51]
|
Game Theory–A Way to Network Security
|
|
|
|
|