Game theory meets network security and privacy

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Game Theory Meets Information Security Management

This work addresses the challenge “how do we make better security decisions?” and it develops techniques to support human decision making and algorithms which enable well-founded cyber security decisions to be made. In this paper we propose a game theoretic model which optimally allocates cyber security resources such as administrators’ time across different tasks. We first model the interactio...

متن کامل

Game Theory Based Network Security

The interactions between attackers and network administrator are modeled as a non-cooperative non-zero-sum dynamic game with incomplete information, which considers the uncertainty and the special properties of multi-stage attacks. The model is a Fictitious Play approach along a special game tree when the attacker is the leader and the administrator is the follower. Multi-objective optimization...

متن کامل

Network Security Validation Using Game Theory

Non-functional requirements (NFR) such as network security recently gained widespread attention in distributed information systems. Despite their importance however, there is no systematic approach to validate these requirements given the complexity and uncertainty characterizing modern networks. Traditionally, network security requirements specification has been the results of a reactive proce...

متن کامل

Compressed Sensing Meets Game Theory

We introduce the MUSE Algorithm and prove that for any ksparse vector α∗, any measurement matrix Φ, and any noise vector ε, given f = Φα∗ + ε, the proposed algorithm finds a k-sparse vector α̂ such that ∥Φα̂−f∥∞ ≤ ∥ε∥∞+O ( 1 √ k ) . The proposed algorithm is based on reformulating the sparse approximation problem as a zero-sum game over a properly chosen new space. If the projection matrix satisf...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: ACM Computing Surveys

سال: 2013

ISSN: 0360-0300,1557-7341

DOI: 10.1145/2480741.2480742