Game theory for cyber security and privacy

CT Do, NH Tran, C Hong, CA Kamhoua… - ACM Computing …, 2017 - dl.acm.org
In this survey, we review the existing game-theoretic approaches for cyber security and
privacy issues, categorizing their application into two classes, security and privacy. To show …

Leveraging artificial intelligence to enhance data security and combat cyber attacks

Y Weng, J Wu - Journal of Artificial Intelligence General science …, 2024 - newjaigs.com
This research paper examines the potential of artificial intelligence (AI) in strengthening data
security and mitigating the growing threat of cyber-attacks. As digital threats continue to …

[PDF][PDF] A game theory method to cyber-threat information sharing in cloud computing technology

M Amini, Z Bozorgasl - International Journal of Information System …, 2023 - papers.ssrn.com
Cybersecurity is a top priority in industry, academia, and government, and information
sharing about cyber-threats between different organizations has the potential to maximize …

[PDF][PDF] Simulation for cybersecurity: state of the art and future directions

H Kavak, JJ Padilla, D Vernon-Bido… - Journal of …, 2021 - academic.oup.com
In this article, we provide an introduction to simulation for cybersecurity and focus on three
themes:(1) an overview of the cybersecurity domain;(2) a summary of notable simulation …

Community-structured evolutionary game for privacy protection in social networks

J Du, C Jiang, KC Chen, Y Ren… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Social networks have attracted billions of users and supported a wide range of interests and
practices. Users of social networks can be connected with each other by different …

Optimal decision making approach for cyber security defense using evolutionary game

H Hu, Y Liu, C Chen, H Zhang… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
At present, there are many techniques for cyber security defense such as firewall, intrusion
detection and cryptography. Despite decades of studies and experiences on this issue, there …

A fixed-priority-driven open environment for real-time applications

TW Kuo, CH Li - Proceedings 20th IEEE Real-Time Systems …, 1999 - ieeexplore.ieee.org
This paper extends the useful concept of open systems proposed by WS Liu, et al.(1997) in
scheduling real-time applications and non-real-time applications, where the schedulability of …

PRACIS: Privacy-preserving and aggregatable cybersecurity information sharing

JM de Fuentes, L González-Manzano, J Tapiador… - computers & …, 2017 - Elsevier
Cooperative cyberdefense has been recognized as an essential strategy to fight against
cyberattacks. Cybersecurity Information Sharing (CIS), especially about threats and …

Blocynfo-share: Blockchain based cybersecurity information sharing with fine grained access control

S Badsha, I Vakilinia, S Sengupta - 2020 10th Annual …, 2020 - ieeexplore.ieee.org
To build a proactive cyber defense system, sharing the cybersecurity information has been
very popular by which any organization can get more information about unknown and new …

Information sharing in cybersecurity: A review

A Pala, J Zhuang - Decision Analysis, 2019 - pubsonline.informs.org
In this survey, we review the cybersecurity information-sharing literature, categorizing the
identified papers based on their main focus and methodological approaches implemented to …