Game theoretic risk analysis of security threats
From MaRDI portal
Publication:951220
DOI10.1007/978-0-387-87767-9zbMath1173.91012OpenAlexW435251533MaRDI QIDQ951220
No author found.
Publication date: 30 October 2008
Published in: International Series in Operations Research \& Management Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-0-387-87767-9
Applications of game theory (91A80) (n)-person games, (n>2) (91A06) Collections of articles of miscellaneous specific interest (00B15) Proceedings, conferences, collections, etc. pertaining to game theory, economics, and finance (91-06) Other game-theoretic models (91A40)
Related Items (9)
Cyber-physical correlation effects in defense games for large discrete infrastructures ⋮ Patrolling a perimeter ⋮ Models of the optimal resource allocation for the critical infrastructure protection ⋮ Risk analysis beyond vulnerability and resilience -- characterizing the defensibility of critical systems ⋮ Deception tactics for network interdiction: A multiobjective approach ⋮ Systems under attack-survivability rather than reliability: concept, results, and applications ⋮ Unnamed Item ⋮ Interdependent defense games with applications to internet security at the level of autonomous systems ⋮ A leader-follower partially observed, multiobjective Markov game
This page was built for publication: Game theoretic risk analysis of security threats