[PDF][PDF] Game theory basics and its application in cyber security

AE Chukwudi, E Udoka, I Charles - Advances in Wireless …, 2017 - academia.edu
The concept of game theory has in recent times has found application extensively in the
area of security usually called security games. A game could be normal form or extensive …

A review of game theory approach to cyber security risk management

DA Akinwumi, GB Iwasokun, BK Alese… - Nigerian Journal of …, 2017 - ajol.info
Cyber security is among the most complex and rapidly evolving issues and has been the
focus of present day organizations. Cyber security risk management is the process of …

A mean field game theoretic approach for security enhancements in mobile ad hoc networks

Y Wang, FR Yu, H Tang… - IEEE transactions on …, 2014 - ieeexplore.ieee.org
Game theory can provide a useful tool to study the security problem in mobile ad hoc
networks (MANETs). Most of existing works on applying game theories to security only …

Cyber denial, deception and counter deception

KE Heckman, FJ Stech, RK Thomas… - Advances in Information …, 2015 - Springer
The field of cyber security has evolved over the last three decades and today is at a critical
juncture. Computer network defense (CND) has reached the limits of what traditional …

Game theoretical modelling of network/cybersecurity

A Iqbal, LJ Gunn, M Guo, MA Babar, D Abbott - IEEE Access, 2019 - ieeexplore.ieee.org
Game theory is an established branch of mathematics that offers a rich set of mathematical
tools for multi-person strategic decision making that can be used to model the interactions of …

Security and quality of service (QoS) co-design in cooperative mobile ad hoc networks

FR Yu, H Tang, S Bu, D Zheng - EURASIP Journal on Wireless …, 2013 - Springer
Cooperative communication has been considered as a promising technique to improve
communication quality of service (QoS) in wireless networks, including mobile ad hoc …

How to choose communication links in an adversarial environment?

A Gueye, JC Walrand, V Anantharam - … 2011, Shanghai, China, April 16-18 …, 2012 - Springer
Given the topology of a network, characterized by an undirected graph, we consider the
following game situation: a network manager is choosing (as communication infrastructure) …

A game-theoretic framework for network security vulnerability assessment and mitigation

A Gueye, V Marbukh - International Conference on Decision and Game …, 2012 - Springer
In this paper we propose and discuss a game-theoretic framework for (a) evaluating security
vulnerability,(b) quantifying the corresponding Pareto optimal vulnerability/cost tradeoff, and …

Towards a metric for communication network vulnerability to attacks: A game theoretic approach

A Gueye, V Marbukh, JC Walrand - … , Vancouver, BC, Canada, May 24-26 …, 2012 - Springer
In this paper, we propose a quantification of the vulnerability of a communication network
where links are subject to failures due to the actions of a strategic adversary. We model the …

[PDF][PDF] Review on radio resource allocation optimization in LTE/LTE-advanced using game theory

S Oulaourf, A Haidine, A Aqqal… - International Journal of …, 2017 - core.ac.uk
Recently, there has been a growing trend toward applying game theory (GT) to various
engineering fields in order to solve optimization problems with different competing …