Game theory for cyber security and privacy

CT Do, NH Tran, C Hong, CA Kamhoua… - ACM Computing …, 2017 - dl.acm.org
In this survey, we review the existing game-theoretic approaches for cyber security and
privacy issues, categorizing their application into two classes, security and privacy. To show …

Resource allocation mechanisms and approaches on the Internet of Things

Z Ghanbari, N Jafari Navimipour, M Hosseinzadeh… - Cluster …, 2019 - Springer
Abstract Internet of Things (IoT) as a novel paradigm is an environment with a vast number
of connected things and applications. The IoT devices are used to generate data, which …

An analysis of various iot security techniques: a review

S Srivastava, S Prakash - 2020 8th International Conference on …, 2020 - ieeexplore.ieee.org
Internet of Things mainly provides the way to analyses collected sensing data, from across
the world to taking decision over the situation. Due to such unique nature security is major …

Kalis2. 0-a SECaaS-Based Context-Aware Self-Adaptive Intrusion Detection System for the IoT

A Rullo, D Midi, A Mudjerikar… - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
The wide variety of application domains makes the Internet of Things (IoT) quite unique
among other types of computer networks: IoT networks can be made of devices of different …

Tracing where IoT data are collected and aggregated

C Bodei, P Degano, GL Ferrari… - Logical Methods in …, 2017 - lmcs.episciences.org
The Internet of Things (IoT) offers the infrastructure of the information society. It hosts smart
objects that automatically collect and exchange data of various kinds, directly gathered from …

Game-Theoretic Security Analysis in Heterogeneous IoT Networks: A Competition Perspective

Y Zhu, H Wu, X Tao, S Wang - IEEE Internet of Things Journal, 2024 - ieeexplore.ieee.org
Many interconnected terminals in the Internet of Things (IoT) networks raise significant
security risks. From a competitive perspective, the many heterogeneous nodes, including …

A game of things: Strategic allocation of security resources for iot

A Rullo, D Midi, E Serra, E Bertino - … on Internet-of-Things Design and …, 2017 - dl.acm.org
In many Internet of Thing (IoT) application domains security is a critical requirement,
because malicious parties can undermine the effectiveness of IoT-based systems by …

Security techniques for sensor systems and the Internet of Things

D Midi - 2016 - search.proquest.com
PURDUE UNIVERSITY GRADUATE SCHOOL Thesis/Dissertation Acceptance This is to certify
that the thesis/dissertation prepared By En Page 1 Graduate School Form 30 Updated …

[PDF][PDF] CERIAS Tech Report 2016-10 Security Techniques for Sensor Systems and the Internet of Things

D Midi - cerias.purdue.edu
In the current data-driven world, sensors and sensor networks are becoming pervasive in a
large number of application domains. Their small size, low cost, and limited need for …

Study on China Provincial Standardization and Spatial Diffusion

L Shanshan, L Yanchen… - 2015 8th International …, 2015 - ieeexplore.ieee.org
Based on the method of data mining and academia model analysis, the paper is committed
to describing and analyzing the characters of provincial standardization in China, measuring …