FlipPath Game to Counter Stealthy Attacks in SDN-Based Tactical Networks

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:GameSec (14. : 2023 : Avignon) Decision and game theory for security
1. Verfasser: Mvah, Fabrice (VerfasserIn)
Weitere Verfasser: Tchendji, Vianney Kengne (VerfasserIn), Tayou, Clémentin Djamegni (VerfasserIn), Anwar, Ahmed H. (VerfasserIn), Tosh, Deepak K. (VerfasserIn), Kamhoua, Charles (VerfasserIn)
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2023
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
Observable Perfect Equilibrium 2023 Ganzfried, Sam
Does Cyber-Insurance Benefit the Insured or the Attacker? — A Game of Cyber-Insurance 2023 Li, Zhen
Shades of Grey: Strategic Bimatrix Stopping Games for Modelling (Un) Ethical Hacking Roles 2023 Pflügel, Eckhard
Rule Enforcing Through Ordering 2023 Sychrovsky, David
The Credential is Not Enough: Deception with Honeypots and Fake Credentials 2023 Cromp, Sonia
A Game-Theoretic Analysis of Auditing Differentially Private Algorithms with Epistemically Disparate Herd 2023 Yang, Ya-Ting
Scalable Learning of Intrusion Response Through Recursive Decomposition 2023 Hammar, Kim
Honeypot Allocation for Cyber Deception in Dynamic Tactical Networks: A Game Theoretic Approach 2023 Sayed, Abu
Playing Repeated Coopetitive Polymatrix Games with Small Manipulation Cost 2023 Mahesh, Shivakumar
Modeling and Analysis of a Nonlinear Security Game with Mixed Armament 2023 Hénaff, Jean Le
Multi-defender Security Games with Schedules 2023 Song, Zimeng
Asymmetric Centrality Game Against Network Epidemic Propagation 2023 Kouam, Willie
Characterizing and Improving the Robustness of Predict-Then-Optimize Frameworks 2023 Johnson-Yu, Sonja
Quantisation Effects in Adversarial Cyber-Physical Games 2023 Adams, Takuma
Optimal Resource Allocation for Proactive Defense with Deception in Probabilistic Attack Graphs 2023 Ma, Haoxiang
Rational Broadcast Protocols Against Timid Adversaries 2023 Yamashita, Keigo
FlipPath Game to Counter Stealthy Attacks in SDN-Based Tactical Networks 2023 Mvah, Fabrice
Opacity-Enforcing Active Perception and Control Against Eavesdropping Attacks 2023 Udupa, Sumukha
Double-Sided Information Asymmetry in Double Extortion Ransomware 2023 Meurs, Tom
Alle Artikel auflisten