In this article the examples of game theory methods applicability for the substantiation of quantitative assessment of computer systems security have been given. Game theory models of information security have been classified according to their applications areas. Moreover possible directions of their future research have been taken under consideratio
Abstract—As networks become ubiquitous in people’s lives, users depend on networks a lot for suffici...
This survey provides a structured and comprehensive overview of research on security and privacy in ...
Security games are an example of a successful real-world application of game theory. The paper defin...
A game-theoretic approach is presented, which claims to be a universal method for solving most probl...
The progressively ubiquitous connectivity in the present information systems pose newer challenges t...
A game-theoretic approach is presented, which claims to be a universal method for solving most probl...
The chapters in this volume explore how various methods from game theory can be utilized to optimize...
Since its origins, when it was mainly connected to the field of economics, game theory has brought i...
Network security is a complex and challenging problem. The area of network defense mechanism design ...
The progressively ubiquitous connectivity in the present information systems pose newer challenges t...
The goal of this paper is to (re)introduce a real-world chal-lenge problem for researchers in multia...
While there are significant advances in information technology and infrastructure which offer new op...
Game theory is an established branch of mathematics that offers a rich set of mathematical tools for...
Cyber security is among the most complex and rapidly evolving issues and has been the focus of prese...
© Springer International Publishing Switzerland 2015. Until twenty years ago, the application of gam...
Abstract—As networks become ubiquitous in people’s lives, users depend on networks a lot for suffici...
This survey provides a structured and comprehensive overview of research on security and privacy in ...
Security games are an example of a successful real-world application of game theory. The paper defin...
A game-theoretic approach is presented, which claims to be a universal method for solving most probl...
The progressively ubiquitous connectivity in the present information systems pose newer challenges t...
A game-theoretic approach is presented, which claims to be a universal method for solving most probl...
The chapters in this volume explore how various methods from game theory can be utilized to optimize...
Since its origins, when it was mainly connected to the field of economics, game theory has brought i...
Network security is a complex and challenging problem. The area of network defense mechanism design ...
The progressively ubiquitous connectivity in the present information systems pose newer challenges t...
The goal of this paper is to (re)introduce a real-world chal-lenge problem for researchers in multia...
While there are significant advances in information technology and infrastructure which offer new op...
Game theory is an established branch of mathematics that offers a rich set of mathematical tools for...
Cyber security is among the most complex and rapidly evolving issues and has been the focus of prese...
© Springer International Publishing Switzerland 2015. Until twenty years ago, the application of gam...
Abstract—As networks become ubiquitous in people’s lives, users depend on networks a lot for suffici...
This survey provides a structured and comprehensive overview of research on security and privacy in ...
Security games are an example of a successful real-world application of game theory. The paper defin...