Journal of Information Security

Journal of Information Security

ISSN Print: 2153-1234
ISSN Online: 2153-1242
www.scirp.org/journal/jis
E-mail: jis@scirp.org
"Game Theory Based Network Security"
written by Yi Luo, Ferenc Szidarovszky, Youssif Al-Nashif, Salim Hariri,
published by Journal of Information Security, Vol.1 No.1, 2010
has been cited by the following article(s):
  • Google Scholar
  • CrossRef
[1] Trapped in Transparency: Analyzing the Effectiveness of Security Defenses in Real-World Scenarios
2022
[2] A Physical-Layer Security Approach for IoT Against Jamming Interference Attacks
2021 IEEE Canadian Conference on …, 2021
[3] Information Security Games: A Survey
2021
[4] A Novel Multi Optimization Based Genetic Algorithm for Network Security
2021
[5] A memory-based game-theoretic defensive approach for digital forensic investigators
Forensic Science International …, 2021
[6] A Review on Defense Strategy Security Mechanism for Sensor Network
Smart Sensor Networks Using AI for …, 2021
[7] The Development of a Model of the Formation of Cybersecurity Outlines Based on Multi Criteria Optimization and Game Theory
2020
[8] Adversarial detection games in network security applications with imperfect and incomplete information
2020
[9] A survey and research challenges of anti-forensics: Evaluation of game-theoretic models in simulation of forensic agents' behaviour
2020
[10] Toward realizing self-protecting healthcare information systems: Design and security challenges
2019
[11] Automotive Cybersecurity
2019
[12] Dynamic Games in Cyber-Physical Security: An Overview
2019
[13] Machine Learning Methods for Network Intrusion Detection and Intrusion Prevention Systems
2018
[14] Autonomous Computer Security Game: Techniques, Strategy and Investigation
2018
[15] Game Theory based Attack Graph Analysis for Cyber War Strategy
2018
[16] Development of cybersecurity mandate for Indian oil and gas industry
2018
[17] Utilizing a Game Theoretical Approach to Prevent Collusion and Incentivize Cooperation in Cybersecurity Contexts
ProQuest Dissertations Publishing, 2017
[18] An Evolutionary Approach of Attack Graphs and Attack Trees: A Survey of Attack Modeling
2017
[19] How Shall We Play a Game?: A Game-theoretical Model for Cyber-warfare Games
2017
[20] A Markov game privacy preserving model in retail applications
IEEE MowNet 2017, International conference on selected topics in Mobile and Wireless Networking, 2017
[21] Attacks and defenses in mobile ip: Modeling with stochastic game petri net
arXiv preprint, 2017
[22] How Shall We Play a Game?
IEEE 30th Computer Security Foundations Symposium (CSF), 2017
[23] An Evolutionary Approach of Attack Graph to Attack Tree Conversion
2017
[24] Dynamic Game Theories in Cyber Security
2016
[25] Factors Influencing the Adoption of Intelligence, Surveillance, and Reconnaissance Technology by Collection Managers
ProQuest Dissertations Publishing, 2016
[26] Game‐Theoretic Computing in Cyber‐Risk
Cyber-Risk Informatics: Engineering Evaluation with Data Science, 2016
[27] A Survey of Game Theoretic Approaches to Modelling Decision-Making in Information Warfare Scenarios
Future Internet, 2016
[28] Propagating mixed uncertainties in cyber attacker payoffs: Exploration of two-phase Monte Carlo sampling and probability bounds analysis
2016
[29] Optimization of rootkit revealing system resources–A game theoretic approach
Journal of King Saud University-Computer and Information Sciences, 2015
[30] Quantifying mixed uncertainties in cyber attacker payoffs
Technologies for Homeland Security (HST), 2015 IEEE International Symposium on, 2015
[31] HackAttack: Game-Theoretic Analysis of Realistic Cyber Conflicts
arXiv preprint arXiv:1511.04389, 2015
[32] Constituents of the domain specific cyber security mandate for the Indian power sector
2015
[33] Informatikai algoritmusok 2.
2015
[34] Informatikai algoritmusok. 2. kötet. Párhuzamos módszerek és optimalizáció
2014
[35] A study of adaptive learning for educational game design
ProQuest Dissertations Publishing, 2014
[36] Reinforcement learning algorithms for adaptive cyber defense against Heartbleed
Proceedings of the First ACM Workshop on Moving Target Defense. ACM, 2014
[37] A multiresolution approach for optimal defense against random attacks
International Journal of Information Security, 2014
[38] A Model-based Validated Autonomic Approach to Self-Protect Computing Systems
Q Chen, S Abdelwahed, A Erradi - ieeexplore.ieee.org, 2014
[39] A game-theory analysis of the rat-group attack in smart grids
Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP), 2014 IEEE Ninth International Conference on. IEEE, 2014
[40] Model-based autonomic security management of networked distributed systems
ProQuest Dissertations Publishing, 2014
[41] Game Theory and Information Security
2014
[42] Game theory for network security
Communications Surveys & Tutorials, IEEE, 2013
[43] Game‐theoretic computing in risk analysis
Wiley Interdisciplinary Reviews: Computational Statistics, 2012
[44] Using Signaling Games to Model the Multi-step Attack-Defense Scenarios on Confidentiality
Decision and Game Theory for Security, 2012
[45] Decision support using deterministic equivalents of probabilistic game trees
Engineering of Computer Based Systems (ECBS), 2012 IEEE 19th International Conference and Workshops on. IEEE, 2012
[46] An Evolutionary Game Theory Approach for Intelligent Patrolling
Procedia Computer Science, 2012
[47] Vulnerability assessment of a food supply chain to an intentional attack
Homeland Security (HST), 2012 IEEE Conference on Technologies for. IEEE, 2012
[48] Using Signaling Games to Model the Multi-step Attack-Defense Scenarios on Confidentiality.
GameSec: International Conference on Decision and Game Theory for Security, 2012
[49] New multi-objective evolutionary game theory algorithm for border security
2012
[50] On optimal strategies in protecting computer networks
Computer Systems and Applications (AICCSA), 2011 9th IEEE/ACS International Conference on. IEEE, 2011
[51] Game Theory–A Way to Network Security
Free SCIRP Newsletters
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top