Harnessing the power of deception in attack graph-based security games
From MaRDI portal
Publication:2056942
DOI10.1007/978-3-030-64793-3_8zbMath1483.68046OpenAlexW3114867537MaRDI QIDQ2056942
Fei Fang, Stephanie Milani, Kevin S. Chan, Charles A. Kamhoua, Weiran Shen, Nandi O. Leslie, Sridhar Venkatesan
Publication date: 8 December 2021
Full work available at URL: https://doi.org/10.1007/978-3-030-64793-3_8
Related Items
Cites Work
- Unnamed Item
- Unnamed Item
- Differential evolution -- a simple and efficient heuristic for global optimization over continuous spaces
- Quantal response equilibria for normal form games
- Complexity of constructing solutions in the core based on synergies among coalitions
- Security and Game Theory
- Approximate Solutions for Attack Graph Games with Imperfect Information
- Honeypot Allocation Games over Attack Graphs for Cyber Deception
- Behavioral and Game-Theoretic Security Investments in Interdependent Systems Modeled by Attack Graphs
- A Unified Continuous Greedy Algorithm for Submodular Maximization