[PDF][PDF] A game theory method to cyber-threat information sharing in cloud computing technology
M Amini, Z Bozorgasl - International Journal of Information System …, 2023 - papers.ssrn.com
Cybersecurity is a top priority in industry, academia, and government, and information
sharing about cyber-threats between different organizations has the potential to maximize …
sharing about cyber-threats between different organizations has the potential to maximize …
Sharing is caring: Designing incentive rebate strategies for information‐sharing alliances
Abstract Information security plays a crucial role in organizational governance and
management, and information‐sharing alliances (ISAs) have emerged as effective platforms …
management, and information‐sharing alliances (ISAs) have emerged as effective platforms …
SoK: Game-Theoretic Cybersecurity: Assumptions, Models, Gaps, and Bridges
The discipline of game theory was introduced in the context of economics, and has been
applied to study cyber attacker and defender behaviors. While adaptions have been made to …
applied to study cyber attacker and defender behaviors. While adaptions have been made to …
A Coupling Approach to Analyzing Games with Dynamic Environments
The theory of learning in games has extensively studied situations where agents respond
dynamically to each other by optimizing a fixed utility function. However, in real situations …
dynamically to each other by optimizing a fixed utility function. However, in real situations …
Characterizing Internet-Based Social Engineering Attacks Through a Psychological Lens
TT Longtchi - 2024 - search.proquest.com
Internet-based social engineering attacks have become a major cyber threat. These attacks
use manipulative and deceptive means to make individuals divulge sensitive information or …
use manipulative and deceptive means to make individuals divulge sensitive information or …
A Game-Theoretic Approach for Pricing and Determining Quality Levels of Cybersecurity Products Under an Exogenous Information-Sharing Program
Price and quality level of products are two important decisions of any business. This paper
provides equilibrium solutions for these decisions of two players for a cybersecurity …
provides equilibrium solutions for these decisions of two players for a cybersecurity …