[BOK][B] Network security: A decision and game-theoretic approach

T Alpcan, T Başar - 2010 - books.google.com
Covering attack detection, malware response, algorithm and mechanism design, privacy,
and risk management, this comprehensive work applies unique quantitative models derived …

Game theoretic analysis of multiparty access control in online social networks

H Hu, GJ Ahn, Z Zhao, D Yang - … of the 19th ACM symposium on Access …, 2014 - dl.acm.org
Existing online social networks (OSNs) only allow a single user to restrict access to her/his
data but cannot provide any mechanism to enforce privacy concerns over data associated …

An informed model of personal information release in social networking sites

AC Squicciarini, C Griffin - … on Privacy, Security, Risk and Trust …, 2012 - ieeexplore.ieee.org
The emergence of online social networks and the growing popularity of digital
communication has resulted in an increasingly amount of information about individuals …

A novel reputation-based model for e-commerce

P Fouliras - Operational research, 2013 - Springer
Reputation systems are very important in e-markets, where they help buyers to decide
whether to purchase a product. Since a higher reputation often represents higher profit …

A game‐theoretic approach for ensuring trustworthiness in cyber‐physical systems with applications to multiloop UAV control

J Jithish, S Sankaran - Transactions on Emerging …, 2021 - Wiley Online Library
Advancements in computing and communication technologies, coupled with the ubiquitous
availability of low‐cost embedded devices, have enabled the vision of cyber‐physical …

Towards ensuring trustworthiness in cyber-physical systems: a game-theoretic approach

J Jithish, S Sankaran… - … Communication Systems & …, 2020 - ieeexplore.ieee.org
The emergence of Cyber-Physical Systems (CPSs) is a potential paradigm shift for the
usage of Information and Communication Technologies (ICT). From predominantly a …

Towards a game theoretical model for identity validation in social network sites

AC Squicciarini, C Griffin… - 2011 IEEE Third …, 2011 - ieeexplore.ieee.org
Social sites frequently ask for rich sets of user identity properties before granting access.
Users are given the freedom to fail to respond to some of these requests, or can choose to …

Positive and negative behavioral analysis in social networks

A Squicciarini, S Rajtmajer… - … Reviews: Data Mining …, 2017 - Wiley Online Library
Use of online social networks has grown dramatically since the first Web 2.0 technologies
were deployed in the early 2000s. Our ability to capture user data, in particular behavioral …

[PDF][PDF] National Digital Identity Systems: A Perspective of Human-Centric Cybersecurity

MM Hilowle - 2023 - dro.deakin.edu.au
This research explores the human-centric cybersecurity perspective in the usage of national
digital identity systems (NDIDs). Security, flexibility, usability, privacy, cultural factors, and …

Dijital Oyun Ortamında NFT Kullanımı ve Oyna-Kazan Modelinin Yapısal Analizi

M Aydemir, V Fetah - TRT Akademi, 2022 - dergipark.org.tr
Yeni medya sistemi içinde sanal toplulukların çevrim içi yönelim alanlarından birisi oyun
ortamları olarak görülmektedir. Oyun, bireylerin gündelik yaşamlarında ağ hareketleri …