Game theory for cyber security and privacy
In this survey, we review the existing game-theoretic approaches for cyber security and
privacy issues, categorizing their application into two classes, security and privacy. To show …
privacy issues, categorizing their application into two classes, security and privacy. To show …
Leveraging artificial intelligence to enhance data security and combat cyber attacks
Y Weng, J Wu - Journal of Artificial Intelligence General science …, 2024 - newjaigs.com
This research paper examines the potential of artificial intelligence (AI) in strengthening data
security and mitigating the growing threat of cyber-attacks. As digital threats continue to …
security and mitigating the growing threat of cyber-attacks. As digital threats continue to …
[PDF][PDF] A game theory method to cyber-threat information sharing in cloud computing technology
M Amini, Z Bozorgasl - International Journal of Information System …, 2023 - papers.ssrn.com
Cybersecurity is a top priority in industry, academia, and government, and information
sharing about cyber-threats between different organizations has the potential to maximize …
sharing about cyber-threats between different organizations has the potential to maximize …
[PDF][PDF] Simulation for cybersecurity: state of the art and future directions
H Kavak, JJ Padilla, D Vernon-Bido… - Journal of …, 2021 - academic.oup.com
In this article, we provide an introduction to simulation for cybersecurity and focus on three
themes:(1) an overview of the cybersecurity domain;(2) a summary of notable simulation …
themes:(1) an overview of the cybersecurity domain;(2) a summary of notable simulation …
Community-structured evolutionary game for privacy protection in social networks
Social networks have attracted billions of users and supported a wide range of interests and
practices. Users of social networks can be connected with each other by different …
practices. Users of social networks can be connected with each other by different …
Optimal decision making approach for cyber security defense using evolutionary game
At present, there are many techniques for cyber security defense such as firewall, intrusion
detection and cryptography. Despite decades of studies and experiences on this issue, there …
detection and cryptography. Despite decades of studies and experiences on this issue, there …
A fixed-priority-driven open environment for real-time applications
TW Kuo, CH Li - Proceedings 20th IEEE Real-Time Systems …, 1999 - ieeexplore.ieee.org
This paper extends the useful concept of open systems proposed by WS Liu, et al.(1997) in
scheduling real-time applications and non-real-time applications, where the schedulability of …
scheduling real-time applications and non-real-time applications, where the schedulability of …
PRACIS: Privacy-preserving and aggregatable cybersecurity information sharing
Cooperative cyberdefense has been recognized as an essential strategy to fight against
cyberattacks. Cybersecurity Information Sharing (CIS), especially about threats and …
cyberattacks. Cybersecurity Information Sharing (CIS), especially about threats and …
Blocynfo-share: Blockchain based cybersecurity information sharing with fine grained access control
To build a proactive cyber defense system, sharing the cybersecurity information has been
very popular by which any organization can get more information about unknown and new …
very popular by which any organization can get more information about unknown and new …
Information sharing in cybersecurity: A review
A Pala, J Zhuang - Decision Analysis, 2019 - pubsonline.informs.org
In this survey, we review the cybersecurity information-sharing literature, categorizing the
identified papers based on their main focus and methodological approaches implemented to …
identified papers based on their main focus and methodological approaches implemented to …