Honeypot Allocation Games over Attack Graphs for Cyber Deception
From MaRDI portal
Publication:5075363
DOI10.1002/9781119723950.ch4OpenAlexW3200473491MaRDI QIDQ5075363
Nandi O. Leslie, Charles A. Kamhoua, Ahmed H. Anwar, Christopher Kiekintveld
Publication date: 16 May 2022
Published in: Game Theory and Machine Learning for Cyber Security (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1002/9781119723950.ch4
Learning and adaptive systems in artificial intelligence (68T05) Applications of game theory (91A80) Computer security (68M25)
Related Items (3)
Harnessing the power of deception in attack graph-based security games ⋮ Decoy allocation games on graphs with temporal logic objectives ⋮ Game theory on attack graph for cyber deception
This page was built for publication: Honeypot Allocation Games over Attack Graphs for Cyber Deception