Game Theory for Cyber Security and Privacy

In this survey, we review the existing game-theoretic approaches for cyber security and privacy issues, categorizing their application into two classes, security and privacy. To show how game theory is utilized in cyberspace security and privacy, we select research regarding three main applications: cyber-physical security, communication security, and privacy. We present game models, features, and solutions of the selected works and describe their advantages and limitations from design to implementation of the defense mechanisms. We also identify some emerging trends and topics for future research. This survey not only demonstrates how to employ game-theoretic approaches to security and privacy but also encourages researchers to employ game theory to establish a comprehensive understanding of emerging security and privacy problems in cyberspace and potential solutions.

[1]  Yuguang Fang,et al.  A game-theoretic approach for achieving k-anonymity in Location Based Services , 2013, 2013 Proceedings IEEE INFOCOM.

[2]  Dan Shen,et al.  Adaptive Markov Game Theoretic Data Fusion Approach for Cyber Network Defense , 2007, MILCOM 2007 - IEEE Military Communications Conference.

[3]  Andrew P. Martin,et al.  On the Feasibility of an Open-Implementation Cloud Infrastructure: A Game Theoretic Analysis , 2015, 2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing (UCC).

[4]  Cheng-Xiang Wang,et al.  Channel Modeling of Information Transmission Over Cognitive Interrogator-Sensor Networks , 2011, IEEE Transactions on Vehicular Technology.

[5]  Niki Pissinou,et al.  Belief-free equilibrium of packet forwarding game in ad hoc networks under imperfect monitoring , 2010, International Performance Computing and Communications Conference.

[6]  John Ross Wallrabenstein Rational Multiparty Computation , 2014 .

[7]  Hsiao-Hwa Chen,et al.  An Energy-Aware Trust Derivation Scheme With Game Theoretic Approach in Wireless Sensor Networks for IoT Applications , 2014, IEEE Internet of Things Journal.

[8]  Madasamy Kaliappan,et al.  Enhancing secure routing in Mobile Ad Hoc Networks using a Dynamic Bayesian Signalling Game model , 2015, Comput. Electr. Eng..

[9]  Jean-Pierre Hubaux,et al.  Nuglets: a Virtual Currency to Stimulate Cooperation in Self-Organized Mobile Ad Hoc Networks , 2001 .

[10]  Jiannong Cao,et al.  OSR: Optimal and Secure Routing Protocol in Multi-hop Wireless Networks , 2012, 2012 32nd International Conference on Distributed Computing Systems Workshops.

[11]  Mohamed Hamdi,et al.  Game-based adaptive security in the Internet of Things for eHealth , 2014, 2014 IEEE International Conference on Communications (ICC).

[12]  Levente Buttyán,et al.  Nash equilibria of packet forwarding strategies in wireless ad hoc networks , 2006, IEEE Transactions on Mobile Computing.

[13]  Abbas Jamalipour,et al.  An Evolutionary Game Theory-Based Approach to Cooperation in VANETs Under Different Network Conditions , 2015, IEEE Transactions on Vehicular Technology.

[14]  Georg Fuchsbauer,et al.  Efficient Rational Secret Sharing in Standard Communication Networks , 2010, IACR Cryptol. ePrint Arch..

[15]  Axel W. Krings,et al.  Dynamic Hybrid Fault Modeling and Extended Evolutionary Game Theory for Reliability, Survivability and Fault Tolerance Analyses , 2011, IEEE Transactions on Reliability.

[16]  Carlos Cid,et al.  Optimal Contracts for Outsourced Computation , 2014, GameSec.

[17]  Jian Shen,et al.  Game-Theory-Based Active Defense for Intrusion Detection in Cyber-Physical Embedded Systems , 2016, ACM Trans. Embed. Comput. Syst..

[18]  Quanyan Zhu,et al.  A dynamic game-theoretic approach to resilient control system design for cascading failures , 2012, HiCoNS '12.

[19]  Joshua A. Kroll,et al.  The Economics of Bitcoin Mining, or Bitcoin in the Presence of Adversaries , 2013 .

[20]  Konstantinos Psounis,et al.  Aegis A Novel Cyber-Insurance Model , 2011, GameSec.

[21]  K. J. Ray Liu,et al.  A Belief Evaluation Framework in Autonomous MANETs under Noisy and Imperfect Observation: Vulnerability Analysis and Cooperation Enforcement , 2010, IEEE Transactions on Mobile Computing.

[22]  Heejo Lee,et al.  This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination. INVITED PAPER Cyber–Physical Security of a Smart Grid Infrastructure , 2022 .

[23]  Zhifang Zhang,et al.  Unconditionally Secure Rational Secret Sharing in Standard Communication Networks , 2010, ICISC.

[24]  Ravishankar K. Iyer,et al.  Game Theory with Learning for Cyber Security Monitoring , 2016, 2016 IEEE 17th International Symposium on High Assurance Systems Engineering (HASE).

[25]  Rainer Böhme,et al.  Where to Hide the Bits ? , 2012, GameSec.

[26]  Douglas R. Stinson,et al.  Socio-Rational Secret Sharing as a New Direction in Rational Cryptography , 2012, GameSec.

[27]  Konstantinos Psounis,et al.  Will cyber-insurance improve network security? A market analysis , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.

[28]  Luiz A. DaSilva,et al.  Equilibria for Node Participation in Ad Hoc Networks - An Imperfect Monitoring Approach , 2006, 2006 IEEE International Conference on Communications.

[29]  Guanhua Yan,et al.  Towards a bayesian network game framework for evaluating DDoS attacks and defense , 2012, CCS '12.

[30]  Ran Canetti,et al.  Toward a Game Theoretic View of Secure Computation , 2011, Journal of Cryptology.

[31]  John C. S. Lui,et al.  Security Adoption in Heterogeneous Networks: the Influence of Cyber-Insurance Market , 2012, Networking.

[32]  Niki Pissinou,et al.  A survey of privacy vulnerabilities and defenses in geosocial networks , 2013, IEEE Communications Magazine.

[33]  Mainak Chatterjee,et al.  Coexistence with malicious nodes: A game theoretic approach , 2009, 2009 International Conference on Game Theory for Networks.

[34]  N. Pissinou,et al.  Collaborative trust-based secure routing against colluding malicious nodes in multi-hop ad hoc networks , 2004, 29th Annual IEEE International Conference on Local Computer Networks.

[35]  Shamik Sengupta,et al.  Game Theoretic Modeling to Enforce Security Information Sharing among Firms , 2015, 2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing.

[36]  D. Kahneman Maps of Bounded Rationality: Psychology for Behavioral Economics , 2003 .

[37]  Jonathan Katz,et al.  Bridging Game Theory and Cryptography: Recent Results and Future Directions , 2008, TCC.

[38]  Tamer Başar,et al.  H1-Optimal Control and Related Minimax Design Problems , 1995 .

[39]  Zhu Han,et al.  A routing game in Cognitive Radio Networks against Routing-toward-Primary-User Attacks , 2014, 2014 IEEE Wireless Communications and Networking Conference (WCNC).

[40]  Hong Zhao,et al.  A Game-Theoretic Approach for Testing for Hardware Trojans , 2016, IEEE Transactions on Multi-Scale Computing Systems.

[41]  Andrew P. Martin,et al.  An evolutionary game-theoretic framework for cyber-threat information sharing , 2014, 2015 IEEE International Conference on Communications (ICC).

[42]  T. Basar,et al.  H∞-0ptimal Control and Related Minimax Design Problems: A Dynamic Game Approach , 1996, IEEE Trans. Autom. Control..

[43]  Walter Houser Could What Happened to Sony Happen to Us? , 2015, IT Professional.

[44]  João Pedro Hespanha,et al.  Game Theoretic Stochastic Routing for Fault Tolerance and Security in Computer Networks , 2007, IEEE Transactions on Parallel and Distributed Systems.

[45]  V. Georgiev Using Game Theory to Analyze Wireless Ad Hoc Networks . ” , 2008 .

[46]  Quanyan Zhu,et al.  Robust and resilient control design for cyber-physical systems with an application to power systems , 2011, IEEE Conference on Decision and Control and European Control Conference.

[47]  Reihaneh Safavi-Naini,et al.  Privacy Consensus in Anonymization Systems via Game Theory , 2012, DBSec.

[48]  Jessica J. Fridrich,et al.  Detection of content adaptive LSB matching: a game theory approach , 2014, Electronic Imaging.

[49]  Jean-Yves Le Boudec,et al.  Nodes bearing grudges: towards routing security, fairness, and robustness in mobile ad hoc networks , 2002, Proceedings 10th Euromicro Workshop on Parallel, Distributed and Network-based Processing.

[50]  Dusit Niyato,et al.  A Joint Optimization Approach to Security-as-a-Service Allocation and Cyber Insurance Management , 2015, TrustCom 2015.

[51]  K. J. Ray Liu,et al.  Cooperation and Coalition in Multimedia Fingerprinting Colluder Social Networks , 2012, IEEE Transactions on Multimedia.

[52]  Joon S. Park,et al.  A game theoretic approach for modeling optimal data sharing on Online Social Networks , 2012, 2012 9th International Conference on Electrical Engineering, Computing Science and Automatic Control (CCE).

[53]  Anastasios A. Economides,et al.  Game theoretic path selection to support security in device-to-device communications , 2017, ArXiv.

[54]  Erik Blasch,et al.  A Markov game theoretic data fusion approach for cyber situational awareness , 2007, SPIE Defense + Commercial Sensing.

[55]  Shi Jin,et al.  Outage Probability of Amplify-and-Forward Two-Way Relay Interference-Limited Systems , 2012, IEEE Transactions on Vehicular Technology.

[56]  Christopher Leckie,et al.  A Game Theoretical Approach to Defend Against Co-Resident Attacks in Cloud Computing: Preventing Co-Residence Using Semi-Supervised Learning , 2016, IEEE Transactions on Information Forensics and Security.

[57]  Chase Qishi Wu,et al.  On modeling and simulation of game theory-based defense mechanisms against DoS and DDoS attacks , 2010, SpringSim.

[58]  S. Sitharama Iyengar,et al.  Game-theoretic models for reliable path-length and energy-constrained routing with data aggregation in wireless sensor networks , 2004, IEEE Journal on Selected Areas in Communications.

[59]  Lin Chen,et al.  Data Integrity and Availability Verification Game in Untrusted Cloud Storage , 2014, GameSec.

[60]  Joon S. Park,et al.  Trusted Online Social Network (OSN) services with optimal data management , 2014, Comput. Secur..

[61]  Ibrahim Sogukpinar,et al.  Scalable risk assessment method for cloud computing using game theory (CCRAM) , 2015, Comput. Stand. Interfaces.

[62]  Peng Liu,et al.  Using Signaling Games to Model the Multi-step Attack-Defense Scenarios on Confidentiality , 2012, GameSec.

[63]  Vikram Srinivasan,et al.  Cooperation in wireless ad hoc networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[64]  Niki Pissinou,et al.  Game Theoretic Modeling and Evolution of Trust in Autonomous Multi-Hop Networks: Application to Network Security and Privacy , 2011, 2011 IEEE International Conference on Communications (ICC).

[65]  David K. Y. Yau,et al.  A game theoretic study of attack and defense in cyber-physical systems , 2011, 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[66]  Ariel Rubinstein,et al.  A Course in Game Theory , 1995 .

[67]  Anna Cinzia Squicciarini,et al.  Toward a Game Theoretic Model of Information Release in Social Media with Experimental Results , 2012, 2012 IEEE Symposium on Security and Privacy Workshops.

[68]  Murat Kantarcioglu,et al.  Incentive Compatible Distributed Data Mining , 2010, 2010 IEEE Second International Conference on Social Computing.

[69]  Sheng Zhong,et al.  Stimulating Cooperation in Vehicular Ad Hoc Networks: A Coalitional Game Theoretic Approach , 2011, IEEE Transactions on Vehicular Technology.

[70]  Charles A. Kamhoua,et al.  Testing for Hardware Trojans: A Game-Theoretic Approach , 2014, GameSec.

[71]  T. Başar,et al.  H/sup /spl infin// control of large scale jump linear systems via averaging and aggregation , 1995, Proceedings of 1995 34th IEEE Conference on Decision and Control.

[72]  Latanya Sweeney,et al.  k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[73]  David K. Y. Yau,et al.  Markov Game Analysis for Attack-Defense of Power Networks Under Possible Misinformation , 2013, IEEE Transactions on Power Systems.

[74]  Axel Franzen,et al.  Anonymity in the Dictator Game Revisited , 2012 .

[75]  Tamer Basar,et al.  Optimal control in the presence of an intelligent jammer with limited actions , 2010, 49th IEEE Conference on Decision and Control (CDC).

[76]  Mauro Conti,et al.  Secure Message Delivery Games for Device-to-Device Communications , 2014, GameSec.

[77]  Alon Rosen,et al.  Sequential Rationality in Cryptographic Protocols , 2010, 2010 IEEE 51st Annual Symposium on Foundations of Computer Science.

[78]  Quanyan Zhu,et al.  Attack-Aware Cyber Insurance for Risk Sharing in Computer Networks , 2015, GameSec.

[79]  Steve S. Gorshe Magazine update - December 2012 [Message from the Editor-in-Chief] , 2012, IEEE Commun. Mag..

[80]  Quanyan Zhu,et al.  Dynamic Secure Routing Game in Distributed Cognitive Radio Networks , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.

[81]  Wei Li,et al.  Survivability evaluation towards attacked WSNs based on stochastic game and continuous-time Markov chain , 2012, Appl. Soft Comput..

[82]  Rainer Böhme,et al.  Moving steganography and steganalysis from the laboratory into the real world , 2013, IH&MMSec '13.

[83]  Rainer Böhme,et al.  Security Games with Market Insurance , 2011, GameSec.

[84]  Thomas R. Palfrey,et al.  Erratum to: Quantal response equilibria for extensive form games , 2015 .

[85]  Paulo Tabuada,et al.  Minimax control for cyber-physical systems under network packet scheduling attacks , 2013, HiCoNS '13.

[86]  Jonathan Katz,et al.  Fair Computation with Rational Players , 2012, EUROCRYPT.

[87]  Rainer Böhme,et al.  A game-theoretic analysis of content-adaptive steganography with independent embedding , 2013, 21st European Signal Processing Conference (EUSIPCO 2013).

[88]  Xiaohui Liang,et al.  Morality-Driven Data Forwarding With Privacy Preservation in Mobile Social Networks , 2012, IEEE Transactions on Vehicular Technology.

[89]  Pan Hui,et al.  CyberInsurance for cybersecurity a topological take on modulating insurance premiums , 2012, PERV.

[90]  Kai Chen,et al.  Optimal Defense Strategies for DDoS Defender Using Bayesian Game Model , 2013, ISPEC.

[91]  Chan-Hyun Youn,et al.  Device-to-device communications with social awareness [Guest Editorial] , 2016, IEEE Wirel. Commun..

[92]  Theodore Tryfonas,et al.  Strategic Interaction Analysis of Privacy-Sensitive End-Users of Cloud-Based Mobile Apps , 2013, HCI.

[93]  Sami Tabbane,et al.  A revocation game model for secure cloud storage , 2014, 2014 International Conference on High Performance Computing & Simulation (HPCS).

[94]  Joseph Bonneau,et al.  The Password Game: Negative Externalities from Weak Password Practices , 2010, GameSec.

[95]  Pooya Moradian Zadeh,et al.  A Bayesian Game Approach for Preventing DoS Attacks in Wireless Sensor Networks , 2009, 2009 WRI International Conference on Communications and Mobile Computing.

[96]  Andrew P. Martin,et al.  Security-Aware Virtual Machine Allocation in the Cloud: A Game Theoretic Approach , 2015, 2015 IEEE 8th International Conference on Cloud Computing.

[97]  Murat Kantarcioglu,et al.  Contractual Agreement Design for Enforcing Honesty in Cloud Outsourcing , 2012, GameSec.

[98]  Jens Grossklags,et al.  Blue versus Red: Towards a Model of Distributed Security Attacks , 2009, Financial Cryptography.

[99]  Surendran Subbaraj,et al.  EigenTrust-based non-cooperative game model assisting ACO look-ahead secure routing against selfishness , 2014, EURASIP J. Wirel. Commun. Netw..

[100]  Benjamin C. M. Fung,et al.  Anonymity meets game theory: secure data integration with malicious participants , 2011, The VLDB Journal.

[101]  Minghui Zhu,et al.  Stackelberg-game analysis of correlated attacks in cyber-physical systems , 2011, Proceedings of the 2011 American Control Conference.

[102]  David M. Nicol,et al.  Methodologies for evaluating game theoretic defense against DDoS attacks , 2010, Proceedings of the 2010 Winter Simulation Conference.

[103]  Zhu Han,et al.  Economics of Internet of Things: an information market approach , 2016, IEEE Wireless Communications.

[104]  Carmela Troncoso,et al.  Protecting location privacy: optimal strategy against localization attacks , 2012, CCS.

[105]  Niki Pissinou,et al.  Modeling cooperative, selfish and malicious behaviors for Trajectory Privacy Preservation using Bayesian game theory , 2013, 38th Annual IEEE Conference on Local Computer Networks.

[106]  Joon S. Park,et al.  Social network attack simulation with honeytokens , 2014, Social Network Analysis and Mining.

[107]  S. Sitharama Iyengar,et al.  Game theoretic analysis of users and providers behavior in network under scarce resources , 2012, 2012 International Conference on Computing, Networking and Communications (ICNC).

[108]  Piyushimita Thakuriah,et al.  Protecting Location Privacy , 2011 .

[109]  Saman A. Zonouz,et al.  Cyber-physical security metric inference in smart grid critical infrastructures based on system administrators' responsive behavior , 2013, Comput. Secur..

[110]  Shangping Ren,et al.  Analysis of binary voting algorithms for use in fault-tolerant and secure computing , 2010, The 2010 International Conference on Computer Engineering & Systems.

[111]  Elisa Bertino,et al.  Strategic Security Resource Allocation for Internet of Things , 2016, 2016 IEEE 36th International Conference on Distributed Computing Systems (ICDCS).

[112]  Zhu Han,et al.  Physical layer security: Coalitional games for distributed cooperation , 2009, 2009 7th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks.

[113]  Niki Pissinou,et al.  Game theoretic analysis of cooperation in autonomous multi hop networks: The consequences of unequal traffic load , 2010, 2010 IEEE Globecom Workshops.

[114]  Ming Zhao,et al.  Game Theoretic Modeling of Security and Interdependency in a Public Cloud , 2014, 2014 IEEE 7th International Conference on Cloud Computing.

[115]  Kang Yen,et al.  Sensor network security: a survey , 2009, IEEE Communications Surveys & Tutorials.

[116]  Chris Clifton,et al.  Equilibrium Concepts for Rational Multiparty Computation , 2013, GameSec.

[117]  Ling Shi,et al.  Jamming attack on Cyber-Physical Systems: A game-theoretic approach , 2013, 2013 IEEE International Conference on Cyber Technology in Automation, Control and Intelligent Systems.

[118]  Joon S. Park,et al.  Optimal State Management of Data Sharing in Online Social Network (OSN) Services , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.

[119]  Nicolas Christin,et al.  Audit Mechanisms for Provable Risk Management and Accountable Data Governance , 2012, GameSec.

[120]  Zhu Han,et al.  Enhance device-to-device communication with social awareness: a belief-based stable marriage game framework , 2016, IEEE Wireless Communications.

[121]  Joon S. Park,et al.  Towards trusted data management in online social network (OSN) services , 2012, World Congress on Internet Security (WorldCIS-2012).

[122]  David C. Parkes,et al.  On non-cooperative location privacy: a game-theoretic analysis , 2009, CCS.

[123]  Saman Taghavi Zargar,et al.  A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks , 2013, IEEE Communications Surveys & Tutorials.

[124]  Sankardas Roy,et al.  Game theory-based defense mechanisms against DDoS attacks on TCP/TCP-friendly flows , 2011, 2011 IEEE Symposium on Computational Intelligence in Cyber Security (CICS).

[125]  G. Mailath,et al.  Repeated Games and Reputations , 2006 .

[126]  Dusit Niyato,et al.  Cooperative Packet Delivery in Hybrid Wireless Mobile Networks: A Coalitional Game Approach , 2013, IEEE Transactions on Mobile Computing.

[127]  Shamik Sengupta,et al.  Cyber-Investment and Cyber-Information Exchange Decision Modeling , 2015, 2015 IEEE 17th International Conference on High Performance Computing and Communications, 2015 IEEE 7th International Symposium on Cyberspace Safety and Security, and 2015 IEEE 12th International Conference on Embedded Software and Systems.

[128]  S. Sitharama Iyengar,et al.  Strategic Path Reliability in Information Networks , 2002 .

[129]  Shamik Sengupta,et al.  Establishing evolutionary game models for CYBer security information EXchange (CYBEX) , 2016, J. Comput. Syst. Sci..

[130]  Joon S. Park,et al.  RESILIENT VOTING MECHANISMS FOR MISSION SURVIVABILITY IN CYBERSPACE : COMBINING REPLICATION AND DIVERSITY , 2012 .

[131]  Walid Saad,et al.  Hardware Trojan Detection Game: A Prospect-Theoretic Approach , 2017, IEEE Transactions on Vehicular Technology.

[132]  Walid Saad,et al.  Contract-Theoretic Resource Allocation for Critical Infrastructure Protection , 2014, 2015 IEEE Global Communications Conference (GLOBECOM).

[133]  Ahmed Helmy,et al.  Location-centric isolation of misbehavior and trust routing in energy-constrained sensor networks , 2004, IEEE International Conference on Performance, Computing, and Communications, 2004.

[134]  K. J. Ray Liu,et al.  Cooperation Enforcement in Autonomous MANETs under Noise and Imperfect Observation , 2006, 2006 3rd Annual IEEE Communications Society on Sensor and Ad Hoc Communications and Networks.

[135]  Joon S. Park,et al.  Replication and diversity for survivability in cyberspace: A game theoretic approach , 2013 .

[136]  Sathish Alampalayam Kumar,et al.  Security in Internet of Things: Challenges, Solutions and Future Directions , 2016, 2016 49th Hawaii International Conference on System Sciences (HICSS).

[137]  Joon S. Park,et al.  Game theoretic attack analysis in Online Social Network (OSN) services , 2013, 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2013).

[138]  Tyler Moore,et al.  Game-Theoretic Analysis of DDoS Attacks Against Bitcoin Mining Pools , 2014, Financial Cryptography Workshops.

[139]  Theodore Tryfonas,et al.  A game theoretic defence framework against DoS/DDoS cyber attacks , 2013, Comput. Secur..

[140]  Miguel R. D. Rodrigues,et al.  A zero-sum power allocation game in the parallel Gaussian wiretap channel with an unfriendly jammer , 2012, 2012 IEEE International Conference on Communication Systems (ICCS).

[141]  G. Mailath,et al.  Repeated Games and Reputations: Long-Run Relationships , 2006 .

[142]  Niki Pissinou,et al.  Mitigating selfish misbehavior in multi-hop networks using stochastic game theory , 2010, IEEE Local Computer Network Conference.

[143]  David K. Y. Yau,et al.  Scalable Solutions of Markov Games for Smart-Grid Infrastructure Protection , 2013, IEEE Transactions on Smart Grid.

[144]  Rong Yang,et al.  Improving resource allocation strategies against human adversaries in security games: An extended study , 2013, Artif. Intell..

[145]  J. W. Herrmann,et al.  Game-Theoretic Analysis of Attack and Defense in Cyber-Physical Network Infrastructures , 2012 .

[146]  Kwang-Cheng Chen,et al.  Smart attacks in smart grid communication networks , 2012, IEEE Communications Magazine.

[147]  Alessandro Acquisti,et al.  Privacy and rationality in individual decision making , 2005, IEEE Security & Privacy.

[148]  Mohamed F. Younis,et al.  Providing location anonymity in a multi-base station wireless sensor network , 2012, 2012 IEEE International Conference on Communications (ICC).

[149]  Andrew P. Martin,et al.  Cyber-Threats Information Sharing in Cloud Computing: A Game Theoretic Approach , 2015, 2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing.

[150]  David K. Y. Yau,et al.  Game-theoretic resilience analysis of Cyber-Physical Systems , 2013, 2013 IEEE 1st International Conference on Cyber-Physical Systems, Networks, and Applications (CPSNA).

[151]  Jianhua Ma,et al.  P2P soft security: On evolutionary dynamics of P2P incentive mechanism , 2011, Comput. Commun..

[152]  Joon S. Park,et al.  Surviving in Cyberspace: A Game Theoretic Approach , 2012, J. Commun..

[153]  Sheng Zhong,et al.  Sprite: a simple, cheat-proof, credit-based system for mobile ad-hoc networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[154]  Murat Kantarcioglu,et al.  Incentive Compatible Privacy-Preserving Distributed Classification , 2012, IEEE Transactions on Dependable and Secure Computing.

[155]  Murat Kantarcioglu,et al.  Incentive Compatible Privacy-Preserving Data Analysis , 2013, IEEE Transactions on Knowledge and Data Engineering.

[156]  Chris Clifton,et al.  Realizable Rational Multiparty Cryptographic Protocols , 2014, GameSec.