Together with the massive and rapid evolution of computer networks, there has been a surge of research interest and activity surrounding network security recently. A secure network has to provide users with confidentiality, authentication, data integrity and nonrepudiation, and availability and access control, among other features. With the evolution of current attacks and the emergence of new attacks, in addition to traditional countermeasures, networked systems have to adopt more quantitative approaches to guarantee these features. In response to this need, we study in this thesis several quantitative approaches based on decision theory and game theory for network security. We first examine decentralized detection problems with a finit...
The resiliency of systems integrated through cyber networks is of utmost importance due to the relia...
This survey provides a structured and comprehensive overview of research on security and privacy in ...
The recent developments of advanced intrusion detection systems in the cyber security field provide ...
Together with the massive and rapid evolution of computer networks, there has been a surge of resear...
In this paper, a game theoretical analysis method is presented to provide the optimal security detec...
The increased reliance on the Internet has made information and communication systems more vulnerabl...
We consider a two-player network inspection game, in which a defender positions heterogeneous sensor...
Abstract Game-theoretic modeling of computer security views security attack scenarios as an optimiza...
Nowadays, the Internet and computer networks play an increasing role in our modern society. However,...
Abstract. This paper presents a game-theoretic method for analyzing the security of computer network...
In this dissertation we propose two novel non-zero-sum, adversarial detection games motivated by pro...
International audienceEnforcing security in a network always comes with a trade-off regarding budget...
We investigate the impacts of game-theoretic and behavioral decision-making in two broad classes of ...
Decision making in the context of crime execution and crime prevention can be successfully investiga...
We study the problem of allocating limited security countermeasures to protect network data from cyb...
The resiliency of systems integrated through cyber networks is of utmost importance due to the relia...
This survey provides a structured and comprehensive overview of research on security and privacy in ...
The recent developments of advanced intrusion detection systems in the cyber security field provide ...
Together with the massive and rapid evolution of computer networks, there has been a surge of resear...
In this paper, a game theoretical analysis method is presented to provide the optimal security detec...
The increased reliance on the Internet has made information and communication systems more vulnerabl...
We consider a two-player network inspection game, in which a defender positions heterogeneous sensor...
Abstract Game-theoretic modeling of computer security views security attack scenarios as an optimiza...
Nowadays, the Internet and computer networks play an increasing role in our modern society. However,...
Abstract. This paper presents a game-theoretic method for analyzing the security of computer network...
In this dissertation we propose two novel non-zero-sum, adversarial detection games motivated by pro...
International audienceEnforcing security in a network always comes with a trade-off regarding budget...
We investigate the impacts of game-theoretic and behavioral decision-making in two broad classes of ...
Decision making in the context of crime execution and crime prevention can be successfully investiga...
We study the problem of allocating limited security countermeasures to protect network data from cyb...
The resiliency of systems integrated through cyber networks is of utmost importance due to the relia...
This survey provides a structured and comprehensive overview of research on security and privacy in ...
The recent developments of advanced intrusion detection systems in the cyber security field provide ...