Security interdependencies for networked control systems with identical agents
GameSec'10 Proceedings of the First international conference on Decision and game theory for security
A game theory-based surveillance mechanism against suspicious insiders in MANETs
INTRUST'10 Proceedings of the Second international conference on Trusted Systems
Interplay between security providers, consumers, and attackers: a weighted congestion game approach
GameSec'11 Proceedings of the Second international conference on Decision and Game Theory for Security
Collaborative location privacy with rational users
GameSec'11 Proceedings of the Second international conference on Decision and Game Theory for Security
Digital trust games: an experimental study
GameSec'11 Proceedings of the Second international conference on Decision and Game Theory for Security
Leader selection games under link noise injection attacks
Proceedings of the 1st international conference on High Confidence Networked Systems
Game-theoretic resource allocation for malicious packet detection in computer networks
Proceedings of the 11th International Conference on Autonomous Agents and Multiagent Systems - Volume 2
Mixed-Strategy game based trust management for clustered wireless sensor networks
INTRUST'11 Proceedings of the Third international conference on Trusted Systems
Security of interdependent and identical networked control systems
Automatica (Journal of IFAC)
On Game-Theoretic Network Security Provisioning
Journal of Network and Systems Management
Game theory for security: an important challenge for multiagent systems
EUMAS'11 Proceedings of the 9th European conference on Multi-Agent Systems
Game theory meets network security and privacy
ACM Computing Surveys (CSUR)
Proceedings of the International Workshop on Adaptive Security
On distributed constrained formation control in operator-vehicle adversarial networks
Automatica (Journal of IFAC)
A Security Differential Game Model for Sensor Networks in Context of the Internet of Things
Wireless Personal Communications: An International Journal
Hi-index | 0.00 |
Covering attack detection, malware response, algorithm and mechanism design, privacy, and risk management, this comprehensive work applies unique quantitative models derived from decision, control, and game theories to understanding diverse network security problems. It provides the reader with a system-level theoretical understanding of network security, and is essential reading for researchers interested in a quantitative approach to key incentive and resource allocation issues in the field. It also provides practitioners with an analytical foundation that is useful for formalising decision-making processes in network security.