[PDF][PDF] A game theory method to cyber-threat information sharing in cloud computing technology

M Amini, Z Bozorgasl - International Journal of Information System …, 2023 - papers.ssrn.com
Cybersecurity is a top priority in industry, academia, and government, and information
sharing about cyber-threats between different organizations has the potential to maximize …

Sharing is caring: Designing incentive rebate strategies for information‐sharing alliances

Y Zhuo, S Solak, Y Zou, B Hu - Decision Sciences, 2024 - Wiley Online Library
Abstract Information security plays a crucial role in organizational governance and
management, and information‐sharing alliances (ISAs) have emerged as effective platforms …

SoK: Game-Theoretic Cybersecurity: Assumptions, Models, Gaps, and Bridges

B Collins, S Xu, PN Brown - arXiv preprint arXiv:2401.13815, 2024 - arxiv.org
The discipline of game theory was introduced in the context of economics, and has been
applied to study cyber attacker and defender behaviors. While adaptions have been made to …

A Coupling Approach to Analyzing Games with Dynamic Environments

BC Collins, S Xu, PN Brown - arXiv preprint arXiv:2207.06504, 2022 - arxiv.org
The theory of learning in games has extensively studied situations where agents respond
dynamically to each other by optimizing a fixed utility function. However, in real situations …

Characterizing Internet-Based Social Engineering Attacks Through a Psychological Lens

TT Longtchi - 2024 - search.proquest.com
Internet-based social engineering attacks have become a major cyber threat. These attacks
use manipulative and deceptive means to make individuals divulge sensitive information or …

A Game-Theoretic Approach for Pricing and Determining Quality Levels of Cybersecurity Products Under an Exogenous Information-Sharing Program

M Rasti-Barzoki, J Altmann, B Egger - … on the Economics of Grids, Clouds …, 2022 - Springer
Price and quality level of products are two important decisions of any business. This paper
provides equilibrium solutions for these decisions of two players for a cybersecurity …