Journal of Information Security

Journal of Information Security

ISSN Print: 2153-1234
ISSN Online: 2153-1242
www.scirp.org/journal/jis
E-mail: jis@scirp.org
"Game Theory Based Network Security"
written by Yi Luo, Ferenc Szidarovszky, Youssif Al-Nashif, Salim Hariri,
published by Journal of Information Security, Vol.1 No.1, 2010
has been cited by the following article(s):
  • Google Scholar
  • CrossRef
[1] Coordinated security measures for industrial IoT against eavesdropping
2023 IEEE Texas Power and Energy Conference …, 2023
[2] Cooperative transmission strategy for industrial IoT against interference attacks
2023 IEEE Texas Power and Energy Conference …, 2023
[3] A Game Theoretic Analysis of Cyber Threats.
ICISSP, 2023
[4] Information Security During Interference Attacks
Internet of Things Security and Privacy …, 2023
[5] Formalizing Real-world Threat Scenarios.
ICISSP, 2022
[6] Trapped in Transparency: Analyzing the Effectiveness of Security Defenses in Real-World Scenarios
2022
[7] A Physical-Layer Security Approach for IoT Against Jamming Interference Attacks
2021 IEEE Canadian Conference on …, 2021
[8] Information Security Games: A Survey
2021
[9] A Novel Multi Optimization Based Genetic Algorithm for Network Security
2021
[10] A memory-based game-theoretic defensive approach for digital forensic investigators
Forensic Science International …, 2021
[11] A Review on Defense Strategy Security Mechanism for Sensor Network
Smart Sensor Networks Using AI for …, 2021
[12] The Development of a Model of the Formation of Cybersecurity Outlines Based on Multi Criteria Optimization and Game Theory
2020
[13] Adversarial detection games in network security applications with imperfect and incomplete information
2020
[14] A survey and research challenges of anti-forensics: Evaluation of game-theoretic models in simulation of forensic agents' behaviour
2020
[15] Toward realizing self-protecting healthcare information systems: Design and security challenges
2019
[16] Automotive Cybersecurity
2019
[17] Dynamic Games in Cyber-Physical Security: An Overview
2019
[18] Machine Learning Methods for Network Intrusion Detection and Intrusion Prevention Systems
2018
[19] Autonomous Computer Security Game: Techniques, Strategy and Investigation
2018
[20] Game Theory based Attack Graph Analysis for Cyber War Strategy
2018
[21] Development of cybersecurity mandate for Indian oil and gas industry
2018
[22] Utilizing a Game Theoretical Approach to Prevent Collusion and Incentivize Cooperation in Cybersecurity Contexts
ProQuest Dissertations Publishing, 2017
[23] An Evolutionary Approach of Attack Graphs and Attack Trees: A Survey of Attack Modeling
2017
[24] How Shall We Play a Game?: A Game-theoretical Model for Cyber-warfare Games
2017
[25] A Markov game privacy preserving model in retail applications
IEEE MowNet 2017, International conference on selected topics in Mobile and Wireless Networking, 2017
[26] Attacks and defenses in mobile ip: Modeling with stochastic game petri net
arXiv preprint, 2017
[27] How Shall We Play a Game?
IEEE 30th Computer Security Foundations Symposium (CSF), 2017
[28] An Evolutionary Approach of Attack Graph to Attack Tree Conversion
2017
[29] Dynamic Game Theories in Cyber Security
2016
[30] Factors Influencing the Adoption of Intelligence, Surveillance, and Reconnaissance Technology by Collection Managers
ProQuest Dissertations Publishing, 2016
[31] Game‐Theoretic Computing in Cyber‐Risk
Cyber-Risk Informatics: Engineering Evaluation with Data Science, 2016
[32] A Survey of Game Theoretic Approaches to Modelling Decision-Making in Information Warfare Scenarios
Future Internet, 2016
[33] Propagating mixed uncertainties in cyber attacker payoffs: Exploration of two-phase Monte Carlo sampling and probability bounds analysis
2016
[34] Optimization of rootkit revealing system resources–A game theoretic approach
Journal of King Saud University-Computer and Information Sciences, 2015
[35] Quantifying mixed uncertainties in cyber attacker payoffs
Technologies for Homeland Security (HST), 2015 IEEE International Symposium on, 2015
[36] HackAttack: Game-Theoretic Analysis of Realistic Cyber Conflicts
arXiv preprint arXiv:1511.04389, 2015
[37] Informatikai algoritmusok 2.
2015
[38] Constituents of the domain specific cyber security mandate for the Indian power sector
2015
[39] Informatikai algoritmusok. 2. kötet. Párhuzamos módszerek és optimalizáció
2014
[40] A study of adaptive learning for educational game design
ProQuest Dissertations Publishing, 2014
[41] Reinforcement learning algorithms for adaptive cyber defense against Heartbleed
Proceedings of the First ACM Workshop on Moving Target Defense. ACM, 2014
[42] A multiresolution approach for optimal defense against random attacks
International Journal of Information Security, 2014
[43] A Model-based Validated Autonomic Approach to Self-Protect Computing Systems
Q Chen, S Abdelwahed, A Erradi - ieeexplore.ieee.org, 2014
[44] A game-theory analysis of the rat-group attack in smart grids
Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP), 2014 IEEE Ninth International Conference on. IEEE, 2014
[45] Model-based autonomic security management of networked distributed systems
ProQuest Dissertations Publishing, 2014
[46] Game Theory and Information Security
2014
[47] Game theory for network security
Communications Surveys & Tutorials, IEEE, 2013
[48] Game‐theoretic computing in risk analysis
Wiley Interdisciplinary Reviews: Computational Statistics, 2012
[49] Using Signaling Games to Model the Multi-step Attack-Defense Scenarios on Confidentiality
Decision and Game Theory for Security, 2012
[50] Decision support using deterministic equivalents of probabilistic game trees
Engineering of Computer Based Systems (ECBS), 2012 IEEE 19th International Conference and Workshops on. IEEE, 2012
[51] An Evolutionary Game Theory Approach for Intelligent Patrolling
Procedia Computer Science, 2012
[52] Vulnerability assessment of a food supply chain to an intentional attack
Homeland Security (HST), 2012 IEEE Conference on Technologies for. IEEE, 2012
[53] Using Signaling Games to Model the Multi-step Attack-Defense Scenarios on Confidentiality.
GameSec: International Conference on Decision and Game Theory for Security, 2012
[54] New multi-objective evolutionary game theory algorithm for border security
2012
[55] On optimal strategies in protecting computer networks
Computer Systems and Applications (AICCSA), 2011 9th IEEE/ACS International Conference on. IEEE, 2011
[56] A Physical-Layer Approach for IoT Information Security During Interference Attacks
[57] NETWORKED WAR GAMES: TRAINING THE INTRUSION DETECTION SPECIALIST
Free SCIRP Newsletters
Copyright © 2006-2025 Scientific Research Publishing Inc. All Rights Reserved.
Top