Game Theoretic Risk Analysis of Security Threats

被引:0
|
作者
Li, J. [1 ]
机构
[1] Univ Nottingham, Nottingham NG7 2RD, England
关键词
D O I
暂无
中图分类号
C93 [管理学];
学科分类号
12 ; 1201 ; 1202 ; 120202 ;
摘要
引用
收藏
页码:1795 / 1795
页数:1
相关论文
共 50 条
  • [1] A Game-theoretic Analysis of Hybrid Threats
    Balcaen, Pieter
    Bois, Cind Du
    Buts, Caroline
    [J]. DEFENCE AND PEACE ECONOMICS, 2022, 33 (01) : 26 - 41
  • [2] Game Theoretic Analysis of Security and Sustainability
    An, Bo
    [J]. PROCEEDINGS OF THE TWENTY-SIXTH INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE, 2017, : 5111 - 5115
  • [3] Game-theoretic modeling and analysis of insider threats
    Liu, Debin
    Wang, XiaoFeng
    Camp, Jean
    [J]. INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2008, 1 : 75 - 80
  • [4] A game theoretic approach to cyber security risk management
    Musman, Scott
    Turner, Andrew
    [J]. JOURNAL OF DEFENSE MODELING AND SIMULATION-APPLICATIONS METHODOLOGY TECHNOLOGY-JDMS, 2018, 15 (02): : 127 - 145
  • [5] Threats analysis and security analysis for Critical Infrastructures: Risk analysis vs. Game theory.
    Napolitano, Pierpaolo
    Rossi, Giuliano
    Lombardi, Mara
    Garzia, Fabio
    Ilariucci, Massimo
    Forino, Giuseppe
    [J]. 2018 52ND ANNUAL IEEE INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY (ICCST), 2018, : 172 - 176
  • [6] Game-Theoretic Security Analysis of Quantum Networks
    Rass, Stefan
    Schartner, Peter
    [J]. ICQNM 2009: THIRD INTERNATIONAL CONFERENCE ON QUANTUM, NANO AND MICRO TECHNOLOGIES: PROCEEDINGS, 2009, : 20 - 25
  • [7] A GAME-THEORETIC RENDERING OF PROMISES AND THREATS
    KLEIN, DB
    OFLAHERTY, B
    [J]. JOURNAL OF ECONOMIC BEHAVIOR & ORGANIZATION, 1993, 21 (03) : 295 - 314
  • [8] Game Theoretic Modeling of Insider Threats in an Organization
    Lalropuia, K. C.
    Goyal, Sanjeev
    de Soto, Borja Garcia
    [J]. APPLIED CRYPTOGRAPHY AND NETWORK SECURITY WORKSHOPS, PT II, ACNS 2024-AIBLOCK 2024, AIHWS 2024, AIOTS 2024, SCI 2024, AAC 2024, SIMLA 2024, LLE 2024, AND CIMSS 2024, 2024, 14587 : 188 - 192
  • [9] Game-theoretic computing in risk analysis
    Sahinoglu, Mehmet
    Cueva-Parra, Luis
    Ang, David
    [J]. WILEY INTERDISCIPLINARY REVIEWS-COMPUTATIONAL STATISTICS, 2012, 4 (03): : 227 - 248
  • [10] Fuzzy risk analysis of computer security threats
    Yu, Yingbing
    Shindhelm, Art
    [J]. 2005 International Symposium on Computer Science and Technology, Proceedings, 2005, : 1 - 8