Game theory for network security
X Liang, Y Xiao - IEEE Communications Surveys & Tutorials, 2012 - ieeexplore.ieee.org
As networks become ubiquitous in people's lives, users depend on networks a lot for
sufficient communication and convenient information access. However, networks suffer from …
sufficient communication and convenient information access. However, networks suffer from …
A survey of game theory as applied to network security
Network security is a complex and challenging problem. The area of network defense
mechanism design is receiving immense attention from the research community for more …
mechanism design is receiving immense attention from the research community for more …
Game theory meets network security and privacy
This survey provides a structured and comprehensive overview of research on security and
privacy in computer and communication networks that use game-theoretic approaches. We …
privacy in computer and communication networks that use game-theoretic approaches. We …
A differential game approach for real-time security defense decision in scale-free networks
H Zhang, Y Mi, X Liu, Y Zhang, J Wang, J Tan - Computer Networks, 2023 - Elsevier
The current network security defense decision method is based on the principle of attack–
defense confrontation and generally uses a random network model to project the real …
defense confrontation and generally uses a random network model to project the real …
A bi-level game approach to attack-aware cyber insurance of computer networks
Cyber insurance is a valuable approach to mitigate further the cyber risk and its loss in
addition to the deployment of technological cyber defense solutions, such as intrusion …
addition to the deployment of technological cyber defense solutions, such as intrusion …
Attack-defense differential game model for network defense strategy selection
H Zhang, LV Jiang, S Huang, J Wang, Y Zhang - IEEE Access, 2018 - ieeexplore.ieee.org
The existing game-theoretic approaches for network security problems mostly use the static
game or the multi-stage dynamic game. However, these researches can not meet the …
game or the multi-stage dynamic game. However, these researches can not meet the …
Game strategies in network security
K Lye, JM Wing - International Journal of Information Security, 2005 - Springer
This paper presents a game-theoretic method for analyzing the security of computer
networks. We view the interactions between an attacker and the administrator as a two …
networks. We view the interactions between an attacker and the administrator as a two …
A game theoretic defence framework against DoS/DDoS cyber attacks
T Spyridopoulos, G Karanikas, T Tryfonas… - Computers & …, 2013 - Elsevier
Game-theoretic approaches have been previously employed in the research area of network
security in order to explore the interaction between an attacker and a defender during a …
security in order to explore the interaction between an attacker and a defender during a …
Evaluating network security and optimal active defense based on attack-defense game model
W Jiang, BX Fang, ZH Tian, HL Zhang - Chinese Journal of Computers, 2009 - cjc.ict.ac.cn
To evaluate the security of network information systems and perform active defense, this
paper presents some models including defense graph model, attack-defense taxonomy and …
paper presents some models including defense graph model, attack-defense taxonomy and …
[HTML][HTML] Security defense decision method based on potential differential game for complex networks
H Zhang, Y Mi, Y Fu, X Liu, Y Zhang, J Wang, J Tan - Computers & Security, 2023 - Elsevier
Most defense strategies in complex networks are developed from the defense perspective,
overlooking the key attack-defense characteristics in cybersecurity. A defense decision …
overlooking the key attack-defense characteristics in cybersecurity. A defense decision …