Access the full text.
Sign up today, get DeepDyve free for 14 days.
[In this book, we have studied the applications of SG theory in addressing various dynamic network security games, with a particular focus on the techniques of handling scenarios with information asymmetry. In Chap. 1, preliminaries of game theory, MDP, and SG have been reviewed. With these necessary backgrounds, a brief review of existing security applications of the SG framework is provided in Chap. 2. We have further examined several novel techniques for SG with information asymmetry and their security applications. Particularly, the discussions in Chap. 3 focus on dynamic security games with extra information, and the complementary situations where the defender only has incomplete information are examined in Chap. 4 through the lens of Bayesian SG. In Chap. 5, we have studied how the defender can proactively create information asymmetry to enhance security performance. Lastly, in this chapter, summary and perspective for future works will be provided.]
Published: Mar 1, 2018
Keywords: Security-enhanced Operating; Security Game; Complementary Situation; Security Applications; Extra Information
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.