A Survey of Game Theoretic Methods for Cyber Security
暂无分享,去创建一个
Jing Liu | Yuan Wang | Yongjun Wang | Zhijian Huang | Peidai Xie | Y. Wang | J. Liu | Yongjun Wang | Peidai Xie | Zhijian Huang
[1] R. Gibbons. Game theory for applied economists , 1992 .
[2] Mohsen Guizani,et al. Game theoretic data privacy preservation: Equilibrium and pricing , 2015, 2015 IEEE International Conference on Communications (ICC).
[3] Zhu Han,et al. Physical Layer Security Game: Interaction between Source, Eavesdropper, and Friendly Jammer , 2009, EURASIP J. Wirel. Commun. Netw..
[4] Quanyan Zhu,et al. Game theory meets network security and privacy , 2013, CSUR.
[5] Yoon-Ho Choi,et al. A game theoretic model for dynamic configuration of large-scale intrusion detection signatures , 2016, Multimedia Tools and Applications.
[6] Ming Zhao,et al. Game Theoretic Modeling of Security and Interdependency in a Public Cloud , 2014, 2014 IEEE 7th International Conference on Cloud Computing.
[7] Mehran S. Fallah. A Puzzle-Based Defense Strategy Against Flooding Attacks Using Game Theory , 2010, IEEE Transactions on Dependable and Secure Computing.
[8] Carmela Troncoso,et al. Protecting location privacy: optimal strategy against localization attacks , 2012, CCS.
[9] Quanyan Zhu,et al. GUIDEX: A Game-Theoretic Incentive-Based Mechanism for Intrusion Detection Networks , 2012, IEEE Journal on Selected Areas in Communications.
[10] Yang Xiao,et al. Game Theory for Network Security , 2013, IEEE Communications Surveys & Tutorials.
[11] Ibrahim Sogukpinar,et al. Scalable risk assessment method for cloud computing using game theory (CCRAM) , 2015, Comput. Stand. Interfaces.
[12] Asuman E. Ozdaglar,et al. Network Games: Theory, Models, and Dynamics , 2011, Network Games: Theory, Models, and Dynamics.
[13] Issa Traoré,et al. A Game Theoretic Framework for Cloud Security Transparency , 2015, NSS.
[14] V. Chepyzhov,et al. Attractors for Equations of Mathematical Physics , 2001 .
[15] Jing Chen,et al. Game-theory-based batch identification of invalid signatures in wireless mobile networks , 2015, 2015 IEEE Conference on Computer Communications (INFOCOM).
[16] Lang Tong,et al. A Game-Theoretic Approach to Anonymous Networking , 2012, IEEE/ACM Transactions on Networking.
[17] Paul W. Goldberg,et al. The complexity of computing a Nash equilibrium , 2006, STOC '06.
[18] Chunming Qiao,et al. Optimal resource allocation to defend against deliberate attacks in networking infrastructures , 2012, 2012 Proceedings IEEE INFOCOM.
[19] Chase Qishi Wu,et al. A Survey of Game Theory as Applied to Network Security , 2010, 2010 43rd Hawaii International Conference on System Sciences.
[20] F. Richard Yu,et al. A Mean Field Game Theoretic Approach for Security Enhancements in Mobile Ad hoc Networks , 2014, IEEE Transactions on Wireless Communications.
[21] William H. Sanders,et al. Ieee Transactions on Parallel and Distributed Systems Rre: a Game-theoretic Intrusion Response and Recovery Engine , 2022 .
[22] Jean C. Walrand,et al. How Bad Are Selfish Investments in Network Security? , 2011, IEEE/ACM Transactions on Networking.
[23] Tamer Başar,et al. A game-theoretic view on the physical layer security of cognitive radio networks , 2013, 2013 IEEE International Conference on Communications (ICC).
[24] Tansu Alpcan,et al. Network Security , 2010 .
[25] Andrew P. Martin,et al. Security-Aware Virtual Machine Allocation in the Cloud: A Game Theoretic Approach , 2015, 2015 IEEE 8th International Conference on Cloud Computing.
[26] Koushik Majumder,et al. A Game Theoretic Model to Detect Cooperative Intrusion Over Multiple Packets , 2016 .
[27] Sayan Paul,et al. Extended Game Theoretic Dirichlet Based Collaborative Intrusion Detection Systems , 2016 .
[28] Guanhua Yan,et al. Towards a bayesian network game framework for evaluating DDoS attacks and defense , 2012, CCS '12.
[29] Marc Lelarge,et al. Coordination in Network Security Games: A Monotone Comparative Statics Approach , 2012, IEEE Journal on Selected Areas in Communications.
[30] Quanyan Zhu,et al. Flip the Cloud: Cyber-Physical Signaling Games in the Presence of Advanced Persistent Threats , 2015, GameSec.