Game Theoretic Model of Strategic Honeypot Selection in Computer Networks
From MaRDI portal
Publication:4909438
DOI10.1007/978-3-642-34266-0_12zbMath1377.68025OpenAlexW145844368WikidataQ59209614 ScholiaQ59209614MaRDI QIDQ4909438
Branislav Bošanský, Christopher Kiekintveld, Michal Pěchouček, Radek Píbil, Viliam Lisý
Publication date: 13 March 2013
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-34266-0_12
Network design and communication in computer systems (68M10) Applications of game theory (91A80) Other game-theoretic models (91A40)
Related Items (5)
Deception-Based Game Theoretical Approach to Mitigate DoS Attacks ⋮ Rationalization of detection of the multiple disorders ⋮ Game Theory and Cyber Defense ⋮ Learning hidden Markov models for linear Gaussian systems with applications to event-based state estimation ⋮ Decoy allocation games on graphs with temporal logic objectives
Uses Software
This page was built for publication: Game Theoretic Model of Strategic Honeypot Selection in Computer Networks