[BOK][B] Network security: A decision and game-theoretic approach
Covering attack detection, malware response, algorithm and mechanism design, privacy,
and risk management, this comprehensive work applies unique quantitative models derived …
and risk management, this comprehensive work applies unique quantitative models derived …
Game theoretic analysis of multiparty access control in online social networks
Existing online social networks (OSNs) only allow a single user to restrict access to her/his
data but cannot provide any mechanism to enforce privacy concerns over data associated …
data but cannot provide any mechanism to enforce privacy concerns over data associated …
An informed model of personal information release in social networking sites
The emergence of online social networks and the growing popularity of digital
communication has resulted in an increasingly amount of information about individuals …
communication has resulted in an increasingly amount of information about individuals …
A novel reputation-based model for e-commerce
P Fouliras - Operational research, 2013 - Springer
Reputation systems are very important in e-markets, where they help buyers to decide
whether to purchase a product. Since a higher reputation often represents higher profit …
whether to purchase a product. Since a higher reputation often represents higher profit …
A game‐theoretic approach for ensuring trustworthiness in cyber‐physical systems with applications to multiloop UAV control
Advancements in computing and communication technologies, coupled with the ubiquitous
availability of low‐cost embedded devices, have enabled the vision of cyber‐physical …
availability of low‐cost embedded devices, have enabled the vision of cyber‐physical …
Towards ensuring trustworthiness in cyber-physical systems: a game-theoretic approach
The emergence of Cyber-Physical Systems (CPSs) is a potential paradigm shift for the
usage of Information and Communication Technologies (ICT). From predominantly a …
usage of Information and Communication Technologies (ICT). From predominantly a …
Towards a game theoretical model for identity validation in social network sites
Social sites frequently ask for rich sets of user identity properties before granting access.
Users are given the freedom to fail to respond to some of these requests, or can choose to …
Users are given the freedom to fail to respond to some of these requests, or can choose to …
Positive and negative behavioral analysis in social networks
Use of online social networks has grown dramatically since the first Web 2.0 technologies
were deployed in the early 2000s. Our ability to capture user data, in particular behavioral …
were deployed in the early 2000s. Our ability to capture user data, in particular behavioral …
[PDF][PDF] National Digital Identity Systems: A Perspective of Human-Centric Cybersecurity
MM Hilowle - 2023 - dro.deakin.edu.au
This research explores the human-centric cybersecurity perspective in the usage of national
digital identity systems (NDIDs). Security, flexibility, usability, privacy, cultural factors, and …
digital identity systems (NDIDs). Security, flexibility, usability, privacy, cultural factors, and …
Dijital Oyun Ortamında NFT Kullanımı ve Oyna-Kazan Modelinin Yapısal Analizi
Yeni medya sistemi içinde sanal toplulukların çevrim içi yönelim alanlarından birisi oyun
ortamları olarak görülmektedir. Oyun, bireylerin gündelik yaşamlarında ağ hareketleri …
ortamları olarak görülmektedir. Oyun, bireylerin gündelik yaşamlarında ağ hareketleri …