"Game Theory Based Network Security"
written by Yi Luo, Ferenc Szidarovszky, Youssif Al-Nashif, Salim Hariri,
published by Journal of Information Security, Vol.1 No.1, 2010
has been cited by the following article(s):
  • Google Scholar
  • CrossRef
[1] Game Theory based Attack Graph Analysis for Cyber War Strategy
[2] Autonomous Computer Security Game: Techniques, Strategy and Investigation
[3] How Shall We Play a Game?: A Game-theoretical Model for Cyber-warfare Games
[4] Utilizing a Game Theoretical Approach to Prevent Collusion and Incentivize Cooperation in Cybersecurity Contexts
[5] An Evolutionary Approach of Attack Graphs and Attack Trees: A Survey of Attack Modeling
[6] A Markov game privacy preserving model in retail applications
[7] Attacks and defenses in mobile ip: Modeling with stochastic game petri net
[8] How Shall We Play a Game?
[9] An Evolutionary Approach of Attack Graph to Attack Tree Conversion
[10] Dynamic Game Theories in Cyber Security
[11] Factors Influencing the Adoption of Intelligence, Surveillance, and Reconnaissance Technology by Collection Managers
[12] Game‐Theoretic Computing in Cyber‐Risk
Cyber-Risk Informatics: Engineering Evaluation with Data Science, 2016
[13] A Survey of Game Theoretic Approaches to Modelling Decision-Making in Information Warfare Scenarios
Future Internet, 2016
[14] Propagating mixed uncertainties in cyber attacker payoffs: Exploration of two-phase Monte Carlo sampling and probability bounds analysis
[15] Optimization of rootkit revealing system resources–A game theoretic approach
Journal of King Saud University-Computer and Information Sciences, 2015
[16] Quantifying mixed uncertainties in cyber attacker payoffs
Technologies for Homeland Security (HST), 2015 IEEE International Symposium on, 2015
[17] HackAttack: Game-Theoretic Analysis of Realistic Cyber Conflicts
arXiv preprint arXiv:1511.04389, 2015
[18] Informatikai algoritmusok. 2. kötet. Párhuzamos módszerek és optimalizáció
[19] A study of adaptive learning for educational game design
[20] Reinforcement learning algorithms for adaptive cyber defense against Heartbleed
Proceedings of the First ACM Workshop on Moving Target Defense. ACM, 2014
[21] A multiresolution approach for optimal defense against random attacks
International Journal of Information Security, 2014
[22] A Model-based Validated Autonomic Approach to Self-Protect Computing Systems
Q Chen, S Abdelwahed, A Erradi - ieeexplore.ieee.org, 2014
[23] A game-theory analysis of the rat-group attack in smart grids
Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP), 2014 IEEE Ninth International Conference on. IEEE, 2014
[24] Model-based autonomic security management of networked distributed systems
[25] Game theory for network security
Communications Surveys & Tutorials, IEEE, 2013
[26] Game‐theoretic computing in risk analysis
Wiley Interdisciplinary Reviews: Computational Statistics, 2012
[27] Using Signaling Games to Model the Multi-step Attack-Defense Scenarios on Confidentiality
Decision and Game Theory for Security, 2012
[28] Decision support using deterministic equivalents of probabilistic game trees
Engineering of Computer Based Systems (ECBS), 2012 IEEE 19th International Conference and Workshops on. IEEE, 2012
[29] An Evolutionary Game Theory Approach for Intelligent Patrolling
Procedia Computer Science, 2012
[30] Vulnerability assessment of a food supply chain to an intentional attack
Homeland Security (HST), 2012 IEEE Conference on Technologies for. IEEE, 2012
[31] Using Signaling Games to Model the Multi-step Attack-Defense Scenarios on Confidentiality.
GameSec: International Conference on Decision and Game Theory for Security, 2012
[32] On optimal strategies in protecting computer networks
Computer Systems and Applications (AICCSA), 2011 9th IEEE/ACS International Conference on. IEEE, 2011