Our increasing dependence on information technologies and autonomous systems has escalated international concern for information- and cyber-security in the face of politically, socially and religiously motivated cyber-attacks. Information warfare tactics that interfere with the flow of information can challenge the survival of individuals and groups. It is increasingly important that both humans and machines can make decisions that ensure the trustworthiness of information, communication and autonomous systems. Subsequently, an important research direction is concerned with modelling decision-making processes. One approach to this involves modelling decision-making scenarios as games using game theory. This paper presents a survey of inform...
Cyber-security incidents show how difficult it is to make optimal strategic decisions in such a comp...
When investing in cyber security resources, information security managers have to follow effective d...
This dissertation presents efficient, on-line, convergent methods to find defense strategies against...
This paper presents a succinct review of attempts in the literature to use game theory to model deci...
A game-theoretic approach is presented, which claims to be a universal method for solving most probl...
A game-theoretic approach is presented, which claims to be a universal method for solving most probl...
Computer security in deployed systems is a dynamic interaction between attackers and defenders. Thes...
The progressively ubiquitous connectivity in the present information systems pose newer challenges t...
Game theory is an established branch of mathematics that offers a rich set of mathematical tools for...
While there are significant advances in information technology and infrastructure which offer new op...
Game theory is an established branch of mathematics that offers a rich set of mathematical tools for...
While there are significant advances in information technology and infrastructure which offer new op...
Information assurance plays a critical role in modern countries around the globe and IT systems are ...
Risks faced by information system operators and users are not only determined by their own security ...
Future conflicts will necessitate the ability to conduct effective military operations in a conteste...
Cyber-security incidents show how difficult it is to make optimal strategic decisions in such a comp...
When investing in cyber security resources, information security managers have to follow effective d...
This dissertation presents efficient, on-line, convergent methods to find defense strategies against...
This paper presents a succinct review of attempts in the literature to use game theory to model deci...
A game-theoretic approach is presented, which claims to be a universal method for solving most probl...
A game-theoretic approach is presented, which claims to be a universal method for solving most probl...
Computer security in deployed systems is a dynamic interaction between attackers and defenders. Thes...
The progressively ubiquitous connectivity in the present information systems pose newer challenges t...
Game theory is an established branch of mathematics that offers a rich set of mathematical tools for...
While there are significant advances in information technology and infrastructure which offer new op...
Game theory is an established branch of mathematics that offers a rich set of mathematical tools for...
While there are significant advances in information technology and infrastructure which offer new op...
Information assurance plays a critical role in modern countries around the globe and IT systems are ...
Risks faced by information system operators and users are not only determined by their own security ...
Future conflicts will necessitate the ability to conduct effective military operations in a conteste...
Cyber-security incidents show how difficult it is to make optimal strategic decisions in such a comp...
When investing in cyber security resources, information security managers have to follow effective d...
This dissertation presents efficient, on-line, convergent methods to find defense strategies against...