2016 IEEE First International Conference on Data Science in Cyberspace (DSC) 2016
DOI: 10.1109/dsc.2016.90
|View full text |Cite
|
Sign up to set email alerts
|

A Survey of Game Theoretic Methods for Cyber Security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
12
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 32 publications
(12 citation statements)
references
References 27 publications
0
12
0
Order By: Relevance
“…Thus, these work analyzed the offensive and defensive strategy based on the complete information game. However, the information of both offensive and defensive sides is usually asymmetry in practice [14]. Specifically, the asymmetrical information can be represented by the game features such as the strategy set and the payoff function of the attacker and the defender.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Thus, these work analyzed the offensive and defensive strategy based on the complete information game. However, the information of both offensive and defensive sides is usually asymmetry in practice [14]. Specifically, the asymmetrical information can be represented by the game features such as the strategy set and the payoff function of the attacker and the defender.…”
Section: Related Workmentioning
confidence: 99%
“…Analogously, the payoff of the 0-day access attack using strategy ν 2 can be expressed like (21). In addtion, from (14), (16), (17) and (19), the payoffs are dependent on the value of parameters. Hence, the attacker does not have a strictly dominant strategy.…”
Section: The Bne Of Sahgmentioning
confidence: 99%
“…On the basis of perspectives, games can be categorized into several classes. The varied types of games have been discussed in this section below: Figure 4 represents the classification of various game models plus the security issues each class of games handles [70]. Co-operative games: In a cooperative game, every player enforces cooperative behaviour.…”
Section: Classification Of Games With Their Appications In Network Securitymentioning
confidence: 99%
“…It is an evolving area of security. Eavesdropping and jamming attacks are commonplace on the communication channel of networks [70]. Notably, these attacks are more alarming for wireless networks in comparison to wired networks.…”
Section: Physical Layer Securitymentioning
confidence: 99%
“…There is an antagonistic conflict with opposite goals (the so-called scheme of strict antagonism). We apply game theory and reduce this conflict situation to pair game with zero sum for the choice of the justified decisions [11][12][13]. The implementation of methods realizing power demonstrative blocking is passive, since it has no mechanisms to influence the enemy (passively expects information and technical impact), and in the case of high efficiency it can lead to frustration of the information needs of the enemy and force him to change the impact strategy and (or) compensate for the lack of information from other sources.…”
Section: Basic Protective Settingsmentioning
confidence: 99%