A generalized approach to solve perfect Bayesian Nash equilibrium for practical network attack and defense

[1]  Christoph Schottmüller,et al.  Regime change games with an active defender , 2021, Games Econ. Behav..

[2]  Yunyun Niu,et al.  Strategy evolution of panic pedestrians in emergent evacuation with assailants based on susceptible-infected-susceptible model , 2021, Inf. Sci..

[3]  Wei Yin,et al.  Quantitative cyber-physical security analysis methodology for industrial control systems based on incomplete information Bayesian game , 2021, Comput. Secur..

[4]  Wen Yang,et al.  Detection against randomly occurring complex attacks on distributed state estimation , 2021, Inf. Sci..

[5]  Cheng-Kuang Wu A Game Theory Approach for Risk Analysis and Security Force Deployment Against Multiple Coordinated Attacks. , 2021, Environmental research.

[6]  Xianpei Wang,et al.  Analysis of false data injection attacks in power systems: A dynamic Bayesian game-theoretic approach. , 2021, ISA transactions.

[7]  Jianan Wang,et al.  Particle filtering for a class of cyber-physical systems under Round-Robin protocol subject to randomly occurring deception attacks , 2021, Inf. Sci..

[8]  Brij B. Gupta,et al.  A reputation score policy and Bayesian game theory based incentivized mechanism for DDoS attacks mitigation and cyber defense , 2020, Future Gener. Comput. Syst..

[9]  Mohamed Ould-Khaoua,et al.  Game-theoretic modeling of the behavior of Domain Name System attacker , 2020, Comput. Electr. Eng..

[10]  Chunming Zhang,et al.  A differential game method against attacks in heterogeneous honeynet , 2020, Comput. Secur..

[11]  Jinyin Chen,et al.  MAG-GAN: Massive attack generator via GAN , 2020, Inf. Sci..

[12]  Xiuchun Xiao,et al.  RNN for Solving Time-Variant Generalized Sylvester Equation With Applications to Robots and Acoustic Source Localization , 2020, IEEE Transactions on Industrial Informatics.

[13]  Ya Li,et al.  Adversarial attacks on deep-learning-based radar range profile target recognition , 2020, Inf. Sci..

[14]  Yanjiao Chen,et al.  Event evolution model for cybersecurity event mining in tweet streams , 2020, Inf. Sci..

[15]  Lianhai Wang,et al.  Incentive mechanism for cooperative authentication: An evolutionary game approach , 2020, Inf. Sci..

[16]  Tangi Migot,et al.  A parametrized variational inequality approach to track the solution set of a generalized nash equilibrium problem , 2020, Eur. J. Oper. Res..

[17]  Yuhu Wu,et al.  A congestion game framework for service chain composition in NFV with function benefit , 2020, Inf. Sci..

[18]  Long Cheng,et al.  RNN for Perturbed Manipulability Optimization of Manipulators Based on a Distributed Scheme: A Game-Theoretic Perspective , 2020, IEEE Transactions on Neural Networks and Learning Systems.

[19]  Anju Sharma,et al.  GTM-CSec: Game theoretic model for cloud security based on IDS and honeypot , 2020, Comput. Secur..

[20]  Mark Harman,et al.  Game-theoretic analysis of development practices: Challenges and opportunities , 2020, J. Syst. Softw..

[21]  Quanyan Zhu,et al.  A Dynamic Games Approach to Proactive Defense Strategies against Advanced Persistent Threats in Cyber-Physical Systems , 2019, Comput. Secur..

[22]  Yan Zhang,et al.  Game theoretic approach to shadowed sets: A three-way tradeoff perspective , 2020, Inf. Sci..

[23]  Chong-Xiao Shi,et al.  Nash equilibrium computation in two-network zero-sum games: An incremental algorithm , 2019, Neurocomputing.

[24]  Fengyin Li,et al.  A game-theoretic method based on Q-learning to invalidate criminal smart contracts , 2019, Inf. Sci..

[25]  Jie Cao,et al.  Link prediction in temporal networks: Integrating survival analysis and game theory , 2019, Inf. Sci..

[26]  Guang-Hong Yang,et al.  Distributed Nash equilibrium computation in aggregative games: An event-triggered algorithm , 2019, Inf. Sci..

[27]  Lu Zhou,et al.  Game theoretic security of quantum bit commitment , 2019, Inf. Sci..

[28]  Hongke Zhang,et al.  Smart collaborative distribution for privacy enhancement in moving target defense , 2019, Inf. Sci..

[29]  Hamido Fujita,et al.  Updating three-way decisions in incomplete multi-scale information systems , 2019, Inf. Sci..

[30]  Wenjing Jia,et al.  Intrusion detection model of wireless sensor networks based on game theory and an autoregressive model , 2019, Inf. Sci..

[31]  Tinglong Dai,et al.  Game Theory and Information Economics , 2018, Handbook of Healthcare Analytics.

[32]  Wei Wang,et al.  Game theoretical security detection strategy for networked systems , 2018, Inf. Sci..

[33]  Reinhard Selten Spieltheoretische Behandlung eines Oligopolmodells mit Nachfrageträgheit , 2016 .

[34]  Brian P. Van Leeuwen,et al.  Operational cost of deploying Moving Target Defenses defensive work factors , 2015, MILCOM 2015 - 2015 IEEE Military Communications Conference.

[35]  Akio Matsumoto,et al.  Game Theory and Its Applications , 2015 .

[36]  Tansu Alpcan,et al.  Network Security , 2010 .

[37]  Wei Jiang,et al.  Evaluating Network Security and Optimal Active Defense Based on Attack-Defense Game Model: Evaluating Network Security and Optimal Active Defense Based on Attack-Defense Game Model , 2009 .

[38]  Jiang Wei Evaluating Network Security and Optimal Active Defense Based on Attack-Defense Game Model , 2009 .

[39]  J. Nash NON-COOPERATIVE GAMES , 1951, Classics in Game Theory.