Game theory for cyber security and privacy

CT Do, NH Tran, C Hong, CA Kamhoua… - ACM Computing …, 2017 - dl.acm.org
In this survey, we review the existing game-theoretic approaches for cyber security and
privacy issues, categorizing their application into two classes, security and privacy. To show …

Edge computing resource allocation for unmanned aerial vehicle assisted mobile network with blockchain applications

H Xu, W Huang, Y Zhou, D Yang, M Li… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Mobile edge computing is becoming a major trend in providing computation capacities at the
edge of mobile networks. Meanwhile, unmanned aerial vehicles (UAVs) have been …

Automated cyber and privacy risk management toolkit

G Gonzalez-Granadillo, SA Menesidou… - Sensors, 2021 - mdpi.com
Addressing cyber and privacy risks has never been more critical for organisations. While a
number of risk assessment methodologies and software tools are available, it is most often …

HoneyCar: a framework to configure honeypot vulnerabilities on the internet of vehicles

S Panda, S Rass, S Moschoyiannis, K Liang… - IEEE …, 2022 - ieeexplore.ieee.org
The Internet of Vehicles (IoV), whereby interconnected vehicles that communicate with each
other and with road infrastructure on a common network, has promising socio-economic …

A game-theoretic routing protocol for 3-D underwater acoustic sensor networks

Q Wang, J Li, Q Qi, P Zhou… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
As a key technology of the Internet of Underwater Things (IoUT), underwater acoustic sensor
networks (UASNs) have attracted considerable attention from both academia and industry …

[HTML][HTML] Game-theoretic APT defense: An experimental study on robotics

S Rass, S König, J Wachter, V Mayoral-Vilches… - Computers & …, 2023 - Elsevier
This paper proposes a novel game-theoretic framework for defending against Advanced
Persistent Threats (APTs). It applies the original Cut-The-Rope model into an experimental …

Towards dynamic threat modelling in 5G core networks based on MITRE ATT&CK

R Pell, S Moschoyiannis, E Panaousis… - arxiv preprint arxiv …, 2021 - arxiv.org
This article discusses how the gap between early 5G network threat assessments and an
adversarial Tactics, Techniques, Procedures (TTPs) knowledge base for future use in the …

[PDF][PDF] Multiobjective optimization algorithms for wireless sensor networks

D Kandris, A Alexandridis, T Dagiuklas… - … & Mobile Computing …, 2020 - researchgate.net
A Wireless Sensor Network (WSN), distributed within an area of interest, is a network that
contains many wirelessly interconnected devices, with sensing, communication, and …

A Stackelberg game for street-centric QoS-OLSR protocol in urban vehicular ad hoc networks

M Kadadha, H Otrok, H Barada, M Al-Qutayri… - Vehicular …, 2018 - Elsevier
In this paper, we address the problem of routing in urban Vehicular Ad Hoc Networks
(VANETs) using proactive Optimized Link State Routing (OLSR) protocol in the presence of …

COALA: a protocol for the avoidance and alleviation of congestion in wireless sensor networks

D Kandris, G Tselikis, E Anastasiadis, E Panaousis… - Sensors, 2017 - mdpi.com
The occurrence of congestion has an extremely deleterious impact on the performance of
Wireless Sensor Networks (WSNs). This article presents a novel protocol, named COALA …