A survey: When moving target defense meets game theory

J Tan, H **, H Zhang, Y Zhang, D Chang, X Liu… - Computer Science …, 2023 - Elsevier
Moving target defense (MTD) can break through asymmetry between attackers and
defenders. To improve the effectiveness of cybersecurity defense techniques, defense …

A systematic review on game-theoretic models and different types of security requirements in cloud environment: challenges and opportunities

KS Gill, A Sharma, S Saxena - Archives of Computational Methods in …, 2024 - Springer
The presented survey paper explores the application of game theoretic models for
addressing security challenges in cloud computing environments. It highlights the …

[HTML][HTML] Security defense decision method based on potential differential game for complex networks

H Zhang, Y Mi, Y Fu, X Liu, Y Zhang, J Wang, J Tan - Computers & Security, 2023 - Elsevier
Most defense strategies in complex networks are developed from the defense perspective,
overlooking the key attack-defense characteristics in cybersecurity. A defense decision …

An empirical client cloud environment to secure data communication with alert protocol

D Soni, D Srivastava, A Bhatt… - Mathematical …, 2022 - Wiley Online Library
Cloud computing is a technology that provides resources and utility services based on user
demand. Due to this demand, efficient cloud security protocols are highly required …

Defensive deception framework against reconnaissance attacks in the cloud with deep reinforcement learning

H Li, Y Guo, S Huo, H Hu, P Sun - Science China Information Sciences, 2022 - Springer
Implementing defensive deception in the cloud is promising to proactively counter
reconnaissance attack. This technique presents decoys to camouflage cloud assets and …

Cybersecurity threat assessment integrating qualitative differential and evolutionary games

H Zhang, J Tan, X Liu, S Huang, H Hu… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Most current game theory-based cybersecurity analysis methods use traditional game
models, which do not meet realistic conditions of continuous dynamic changes in attack …

Optimal network defense strategy selection method: a stochastic differential game model

Y Mi, H Zhang, H Hu, J Tan… - Security and …, 2021 - Wiley Online Library
In a real‐world network confrontation process, attack and defense actions change rapidly
and continuously. The network environment is complex and dynamically random. Therefore …

Search for Articles

CS Tiwari, VK Jha - 2023 - mecs-press.org
Cloud computing is a cutting-edge system that's widely considered the future of data
processing, making cloud computing one of the widely used platforms worldwide. Cloud …

Enhancing cloud security: harnessing bayesian game theory for a dynamic defense mechanism

EM Kandoussi, A Houmairi, I El Mir, M Bellafkih - Cluster Computing, 2024 - Springer
Security challenges in complex information technologies continue to grow and diversify. To
improve network security, many researchers have explored the game theoretic approach as …

Research on the evolution of tripartite data protection strategy based on game theory

M Yang, L Feng, X Zhang - Journal of Algorithms & …, 2023 - journals.sagepub.com
In recent years, data leakage incidents have been frequently exposed, and personal privacy
protection has become a major issue. To explore the laws of data leakage and solve …