Game theory for cyber security and privacy

CT Do, NH Tran, C Hong, CA Kamhoua… - ACM Computing …, 2017 - dl.acm.org
In this survey, we review the existing game-theoretic approaches for cyber security and
privacy issues, categorizing their application into two classes, security and privacy. To show …

A systematic review of cyber-resilience assessment frameworks

DAS Estay, R Sahay, MB Barfod, CD Jensen - Computers & security, 2020 - Elsevier
Cyber-attacks are regarded as one of the most serious threats to businesses worldwide.
Organizations dependent on Information Technology (IT) derive value not only from …

Game-theoretic analysis of DDoS attacks against Bitcoin mining pools

B Johnson, A Laszka, J Grossklags, M Vasek… - … Cryptography and Data …, 2014 - Springer
One of the unique features of the digital currency Bitcoin is that new cash is introduced by so-
called miners carrying out resource-intensive proof-of-work operations. To increase their …

A cross-layer defense scheme for edge intelligence-enabled CBTC systems against MitM attacks

Y Li, L Zhu, H Wang, FR Yu, S Liu - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
While communication-based train control (CBTC) systems play a crucial role in the efficient
and reliable operation of urban rail transits, its high penetration level of communication …

Cross-layer defense methods for jamming-resistant CBTC systems

L Zhu, Y Li, FR Yu, B Ning, T Tang… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Communication-based Train Control (CBTC) systems are the burgeoning directions for
develo** future train control systems. With the adoption of wireless communication and …

Amos: Comparison of scan matching approaches for self-localization in indoor environments

JS Gutmann, C Schlegel - … of the First Euromicro Workshop on …, 1996 - ieeexplore.ieee.org
This paper describes results from evaluating different self-localization approaches in indoor
environments for mobile robots. The algorithms examined are based on 2D laser scans and …

Routing around congestion: Defeating DDoS attacks and adverse network conditions via reactive BGP routing

JM Smith, M Schuchard - 2018 IEEE Symposium on Security …, 2018 - ieeexplore.ieee.org
In this paper, we present Nyx, the first system to both effectively mitigate modern Distributed
Denial of Service (DDoS) attacks regardless of the amount of traffic under adversarial control …

When bitcoin mining pools run dry: A game-theoretic analysis of the long-term impact of attacks between mining pools

A Laszka, B Johnson, J Grossklags - … and Wearable, San Juan, Puerto Rico …, 2015 - Springer
Bitcoin has established itself as the most successful cryptocurrency with adoption seen in
many commercial scenarios. While most stakeholders have jointly benefited from the …

: A Game-Theoretic Cyber Insurance Framework for Incentive-Compatible Cyber Risk Management of Internet of Things

R Zhang, Q Zhu - IEEE Transactions on Information Forensics …, 2019 - ieeexplore.ieee.org
Internet of Things (IoT) is highly vulnerable to emerging Advanced Persistent Threats (APTs)
that are often operated by well-resourced adversaries. Achieving perfect security for IoT …

[HTML][HTML] Two decades of cyberattack simulations: A systematic literature review

V Engström, R Lagerström - Computers & Security, 2022 - Elsevier
Cyberattack simulations appear across multiple computer security domains and are
interpreted in many different but equally viable ways. However, this makes the topic appear …