Game theory-based defense mechanisms against DDoS attacks on TCP/TCP-friendly flows
While there are significant advances in information technology and infrastructure which offer
new opportunities, cyberspace is still far from completely secured. In many cases, the …
new opportunities, cyberspace is still far from completely secured. In many cases, the …
A game-theoretic approach for testing for hardware trojans
CA Kamhoua, H Zhao, M Rodriguez… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
The microcircuit industry is witnessing a massive outsourcing of the fabrication of ICs
(Integrated Circuit), as well as the use of third party IP (Intellectual Property) and COTS …
(Integrated Circuit), as well as the use of third party IP (Intellectual Property) and COTS …
Game theoretic modeling and evolution of trust in autonomous multi-hop networks: Application to network security and privacy
CA Kamhoua, N Pissinou… - 2011 IEEE International …, 2011 - ieeexplore.ieee.org
Future applications will require autonomous devices to be interconnected to form a network.
Such networks will not have a central manager; each node will manage itself and will be free …
Such networks will not have a central manager; each node will manage itself and will be free …
Game‐theoretic computing in risk analysis
M Sahinoglu, L Cueva‐Parra… - Wiley Interdisciplinary …, 2012 - Wiley Online Library
Risk analysis, comprising risk assessment and risk management stages, is one of the most
popular and challenging topics of our times because security and privacy, and availability …
popular and challenging topics of our times because security and privacy, and availability …
Simulation of workflow and threat characteristics for cyber security incident response teams
T Reed, RG Abbott, B Anderson… - Proceedings of the …, 2014 - journals.sagepub.com
Within large organizations, the defense of cyber assets generally involves the use of various
mechanisms, such as intrusion detection systems, to alert cyber security personnel to …
mechanisms, such as intrusion detection systems, to alert cyber security personnel to …
A game theoretic approach for digital forensic tool selection
U Karabiyik, T Karabiyik - Mathematics, 2020 - mdpi.com
Digital forensic investigations are getting harder and more time consuming everyday
because of various problems including rapid advances in technology, wide variety of …
because of various problems including rapid advances in technology, wide variety of …
Enhancing cyber-physical security in manufacturing through game-theoretic analysis
Z DeSmit, AU Kulkarni, C Wernz - Cyber-Physical Systems, 2018 - Taylor & Francis
Modern manufacturing systems utilise cyber-physical systems that are interconnected
through an Internet of Things (IoT) network. An IoT infrastructure enables cyber-physical …
through an Internet of Things (IoT) network. An IoT infrastructure enables cyber-physical …
[图书][B] Machine Learning Methods for Network Intrusion Detection and Intrusion Prevention Systems
ZS Stefanova - 2018 - search.proquest.com
Given the continuing advancement of networking applications and our increased
dependence upon software-based systems, there is a pressing need to develop improved …
dependence upon software-based systems, there is a pressing need to develop improved …
Game theoretic approach of eavesdropping attack in millimeter-wave-based WPANs with directional antennas
M Kim - Wireless Networks, 2019 - Springer
In this paper, we propose a game theoretic framework to analyze a passive eavesdropping
attack in millimeter-wave-based wireless personal area networks. As the interaction …
attack in millimeter-wave-based wireless personal area networks. As the interaction …
A game inspired defense mechanism against distributed denial of service attacks
Game theory offers a promising approach toward modeling cyber attacks and
countermeasures as games played among attackers and system defenders. The widely …
countermeasures as games played among attackers and system defenders. The widely …