Deception-Based Game Theoretical Approach to Mitigate DoS Attacks
From MaRDI portal
Publication:3179191
DOI10.1007/978-3-319-47413-7_2zbMath1448.68188OpenAlexW2527986897MaRDI QIDQ3179191
Hayreddin Çeker, Jun Zhuang, Boon Hee Soong, Quang Duy la, Shambhu Upadhyaya
Publication date: 21 December 2016
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-319-47413-7_2
Applications of game theory (91A80) Signaling and communication in game theory (91A28) Computer security (68M25) Games with incomplete information, Bayesian games (91A27)
Related Items
Multi-rate threshold FlipThem ⋮ Modeling bluffing behavior in signaling security games ⋮ A game‐theoretic approach for the location of terror response facilities with both disruption risk and hidden information ⋮ Dynamic games in cyber-physical security: an overview
Cites Work
- Modeling secrecy and deception in a multiple-period attacker-defender signaling game
- Perfect Bayesian equilibrium and sequential equilibrium
- A Supervisory Control Approach to Dynamic Cyber-Security
- Numerical Computation of Multi-goal Security Strategies
- When the Winning Move is Not to Play: Games of Deterrence in Cyber Security
- Private Information of Nonpaternalistic Altruism: Exaggeration and Reciprocation of Generosity
- Game Theoretic Model of Strategic Honeypot Selection in Computer Networks