Game theory-based defense mechanisms against DDoS attacks on TCP/TCP-friendly flows

HS Bedi, S Roy, S Shiva - 2011 IEEE symposium on …, 2011 - ieeexplore.ieee.org
While there are significant advances in information technology and infrastructure which offer
new opportunities, cyberspace is still far from completely secured. In many cases, the …

A game-theoretic approach for testing for hardware trojans

CA Kamhoua, H Zhao, M Rodriguez… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
The microcircuit industry is witnessing a massive outsourcing of the fabrication of ICs
(Integrated Circuit), as well as the use of third party IP (Intellectual Property) and COTS …

Game theoretic modeling and evolution of trust in autonomous multi-hop networks: Application to network security and privacy

CA Kamhoua, N Pissinou… - 2011 IEEE International …, 2011 - ieeexplore.ieee.org
Future applications will require autonomous devices to be interconnected to form a network.
Such networks will not have a central manager; each node will manage itself and will be free …

Game‐theoretic computing in risk analysis

M Sahinoglu, L Cueva‐Parra… - Wiley Interdisciplinary …, 2012 - Wiley Online Library
Risk analysis, comprising risk assessment and risk management stages, is one of the most
popular and challenging topics of our times because security and privacy, and availability …

Simulation of workflow and threat characteristics for cyber security incident response teams

T Reed, RG Abbott, B Anderson… - Proceedings of the …, 2014 - journals.sagepub.com
Within large organizations, the defense of cyber assets generally involves the use of various
mechanisms, such as intrusion detection systems, to alert cyber security personnel to …

A game theoretic approach for digital forensic tool selection

U Karabiyik, T Karabiyik - Mathematics, 2020 - mdpi.com
Digital forensic investigations are getting harder and more time consuming everyday
because of various problems including rapid advances in technology, wide variety of …

Enhancing cyber-physical security in manufacturing through game-theoretic analysis

Z DeSmit, AU Kulkarni, C Wernz - Cyber-Physical Systems, 2018 - Taylor & Francis
Modern manufacturing systems utilise cyber-physical systems that are interconnected
through an Internet of Things (IoT) network. An IoT infrastructure enables cyber-physical …

[图书][B] Machine Learning Methods for Network Intrusion Detection and Intrusion Prevention Systems

ZS Stefanova - 2018 - search.proquest.com
Given the continuing advancement of networking applications and our increased
dependence upon software-based systems, there is a pressing need to develop improved …

Game theoretic approach of eavesdropping attack in millimeter-wave-based WPANs with directional antennas

M Kim - Wireless Networks, 2019 - Springer
In this paper, we propose a game theoretic framework to analyze a passive eavesdropping
attack in millimeter-wave-based wireless personal area networks. As the interaction …

A game inspired defense mechanism against distributed denial of service attacks

H Bedi, S Shiva, S Roy - Security and Communication …, 2014 - Wiley Online Library
Game theory offers a promising approach toward modeling cyber attacks and
countermeasures as games played among attackers and system defenders. The widely …