Risks faced by information system operators and users are not only determined by their own security posture, but are also heavily affected by the security-related decisions of others. This interdependence between information system operators and users is a fundamental property that shapes the efficiency of security defense solutions. Game theory is the most appropriate method to model the strategic interactions between these participants. In this survey, we summarize game-theoretic interdependence models, characterize the emerging security inefficiencies, and present mechanisms to improve the security decisions of the participants. We focus our attention on games with interdependent defenders and do not discuss two-player attacker-defender ...
We propose interdependent defense (IDD) games, a computational game-theoretic framework to study asp...
This research studies the defense strategy of an interdependent system in the face of rational attac...
We investigate the impacts of game-theoretic and behavioral decision-making in two broad classes of ...
A game-theoretic approach is presented, which claims to be a universal method for solving most probl...
The simplest conceptual model of cybersecurity implicitly views attackers and defenders as acting in...
A game-theoretic approach is presented, which claims to be a universal method for solving most probl...
While there are significant advances in information technology and infrastructure which offer new op...
© Springer International Publishing Switzerland 2015. Until twenty years ago, the application of gam...
The progressively ubiquitous connectivity in the present information systems pose newer challenges t...
Cyber-physical systems (CPS) consist of cyber and physical components linked together which are inte...
Most of the cybersecurity research focus on either presenting a specific vulnerability %or hacking t...
Today, information security in defender-attacker game models is getting more attention from the rese...
Although people are frequently urged to protect the machines they use and oversee, the fact remains ...
Our increasing dependence on information technologies and autonomous systems has escalated internati...
The paper uses a game-theoretic setting to examine the interaction between strategic attackers who t...
We propose interdependent defense (IDD) games, a computational game-theoretic framework to study asp...
This research studies the defense strategy of an interdependent system in the face of rational attac...
We investigate the impacts of game-theoretic and behavioral decision-making in two broad classes of ...
A game-theoretic approach is presented, which claims to be a universal method for solving most probl...
The simplest conceptual model of cybersecurity implicitly views attackers and defenders as acting in...
A game-theoretic approach is presented, which claims to be a universal method for solving most probl...
While there are significant advances in information technology and infrastructure which offer new op...
© Springer International Publishing Switzerland 2015. Until twenty years ago, the application of gam...
The progressively ubiquitous connectivity in the present information systems pose newer challenges t...
Cyber-physical systems (CPS) consist of cyber and physical components linked together which are inte...
Most of the cybersecurity research focus on either presenting a specific vulnerability %or hacking t...
Today, information security in defender-attacker game models is getting more attention from the rese...
Although people are frequently urged to protect the machines they use and oversee, the fact remains ...
Our increasing dependence on information technologies and autonomous systems has escalated internati...
The paper uses a game-theoretic setting to examine the interaction between strategic attackers who t...
We propose interdependent defense (IDD) games, a computational game-theoretic framework to study asp...
This research studies the defense strategy of an interdependent system in the face of rational attac...
We investigate the impacts of game-theoretic and behavioral decision-making in two broad classes of ...