A Hypergame Model for Information Security
Abstract
Keywords
References
- D. Fudenberg, and J. Tirole. Game theory. MIT Press/Massachussetts, 1995.
- K. Sallhammar, S. J. Knapskog, and B. E. Helvik, “Using stochastic game theory to compute the expected behavior of attackers”, International Symposium on Applications and the Internet (Saint’2005). Trento, Italy, pp. 102-105, Jan. 31 2005-Feb. 4 2005.
- P. G. Bennett, “Toward a theory of hypergames”, Omega, Vol. 5, No. 6, pp. 749-751, 1977.
- S. Roy, C. Ellis, S. Shiva, D. Dasgupta, V. Shandilya, Q. Wu, “A survey of game theory as applied to network security”, 43rd Hawaii International Conference on System Sciences (HICSS), Hawaii, pp.1-10, 5-8 Jan. 2010.
- M. H. Manshaei, Q. Zhu, T. Alpcan, T. Başar, J.-P. Hubaux, “Game theory meets network security and privacy”, ACM Computing Surveys, Vol. 45, No. 3, Article 25, June 2013.
- A. Singh, A. Lakhotia, and A. Walenstein, “Malware antimalware games,” Proc. 5th International Conference on Information-Warfare & Security (ICIW), Ohio, USA, pp. 319-327, 8-9 April 2010.
- P. Maillé, P. Reichl, and B. Tuffin, “Of threats and costs: A game-theoretic approach to security risk management”, Springer Optimization and Its Applications, Vol. 46, pp. 33-53, 2011.
- A. Patcha, J. M. Park, “A game theoretic formulation for intrusion detection in mobile ad hoc networks,” International Journal of Network Security, Vol. 2, No. 2, pp. 131–137, March 2006.
Details
Primary Language
English
Subjects
-
Journal Section
-
Authors
Yadigar Imamverdiyev
This is me
Publication Date
March 31, 2014
Submission Date
January 30, 2016
Acceptance Date
-
Published in Issue
Year 2014 Volume: 3 Number: 1