: A Game-Theoretic Cyber Insurance Framework for Incentive-Compatible Cyber Risk Management of Internet of Things

R Zhang, Q Zhu - IEEE Transactions on Information Forensics …, 2019 - ieeexplore.ieee.org
Internet of Things (IoT) is highly vulnerable to emerging Advanced Persistent Threats (APTs)
that are often operated by well-resourced adversaries. Achieving perfect security for IoT …

A non-cooperative resource utilization game between two competing malware

VS Varma, Y Hayel… - IEEE Control Systems …, 2022 - ieeexplore.ieee.org
In this letter, we consider a population of digital nodes (such as phones, computers, etc.) that
are under the attack of two competing malware. These malware infect the nodes in order to …

Game theoretic and auction-based algorithms towards opportunistic communications in LPWA LoRa networks

M Haghighi, Z Qin, D Carboni, U Adeel… - 2016 IEEE 3rd World …, 2016 - ieeexplore.ieee.org
Low Power Wide Area (LPWA) networks have been the enabling technology for large-scale
sensor and actuator networks. Low cost, energy-efficiency and longevity of such networks …

[PDF][PDF] Game Theoretic Analysis of Ransomware: A Preliminary Study.

RP Baksi, SJ Upadhyaya - ICISSP, 2022 - scitepress.org
Ransomware attacks have been frequent and wreaking havoc of the kind never seen before.
This paper presents an analysis of a basic type of ransomware. When faced with a …

Managing cyber security risks in industrial control systems with game theory and viable system modelling

T Spyridopoulos, K Maraslis, T Tryfonas… - … on System of …, 2014 - ieeexplore.ieee.org
Cyber security risk management in Industrial Control Systems has been a challenging
problem for both practitioners and the research community. Their proprietary nature along …

A game theoretic approach to the design of mitigation strategies for generic ransomware

RP Baksi, S Upadhyaya - … Conference on Information Systems Security and …, 2021 - Springer
Recently, ransomware attacks have become widespread and are causing unprecedented
damage to cyber-physical systems. Although there are various types of ransomware, this …

Game Theoretic approach towards Optimal Multi-tasking and Data-distribution in IoT

M Haghighi, K Maraslis, T Tryfonas… - 2015 IEEE 2nd …, 2015 - ieeexplore.ieee.org
Current applications of Internet of Things (IoT) often require nodes to implement logical
decision-making on aggregated data, which involves more processing and wider …

Application of a game theoretic approach in smart sensor data trustworthiness problems

K Maraslis, T Spyridopoulos, G Oikonomou… - … Information Security and …, 2015 - Springer
In this work we present an Intrusion Detection (ID) and an Intrusion Prevention (IP) model for
Wireless Sensor Networks (WSNs). The attacker's goal is to compromise the deployment by …

Strategic cyber data risk management over networks: from proactive defense to cyber insurance

R Zhang - 2020 - search.proquest.com
With the recently growing number of cyber-attacks toward sensitive and private data, cyber
data risks (CDRs) become ubiquitous in enterprise networks, manufacturing plants, and …

Towards fast digestion of IMF staff reports with automated text summarization systems

S Liu, J Lindroos - … IEEE/WIC/ACM International Conference on …, 2006 - ieeexplore.ieee.org
In this paper we present a series of experiments carried out adopting varying summarization
schemes for summarizing the IMF staff reports. The summaries produced by the system are …