2019
DOI: 10.1016/j.procs.2019.08.097
|View full text |Cite
|
Sign up to set email alerts
|

A Comparative study of applications of Game Theory in Cyber Security and Cloud Computing.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 23 publications
(7 citation statements)
references
References 6 publications
0
7
0
Order By: Relevance
“…Various devices can connect and communicate with each other in this system by using a similar communication protocol. On the hardware side and with the evolution of IoT and robotics, security has become greatly important [14].…”
Section: Fig 1 Rsa Securidmentioning
confidence: 99%
See 1 more Smart Citation
“…Various devices can connect and communicate with each other in this system by using a similar communication protocol. On the hardware side and with the evolution of IoT and robotics, security has become greatly important [14].…”
Section: Fig 1 Rsa Securidmentioning
confidence: 99%
“…The first problem occurs as a result of dependency on the mobile phone by the user who will be unable to access his account, so he cannot perform two-factor authentication in cases like phone corruption. The second problem occurs when the mobile phone is provided with SMS by hackers with various malicious software to forward the code to another phone [14].…”
Section: Fig 2 Nfc Working Principlementioning
confidence: 99%
“…Their results predicted how an intruder might act in the case of an attack and how an IDS can react to it. Kakkad, Shah, Patel and Doshi (2019) applied Game Theory to modelling cybersecurity and protection of cloud-based online services. For cybersecurity, they have tested several categories of games, such as cooperative models, a static prisoner's dilemma, a Nash Q game, a min-max Q game and a static zero-sum game.…”
Section: Theoretical Frameworkmentioning
confidence: 99%
“…Extensive form games (EFGs) is a natural formulation for multi-player games with imperfect information and sequential play, which models real-world games such as Poker [9,10], Bridge [45], Scotland Yard [41], Diplomacy [7] and has many other important applications such as cybersecurity [32], auction [39], marketing [29]. In multi-player general-sum EFGs, computing an approximate Nash equilibrium (NE) [40] is PPAD-hard [15] and thus likely intractable.…”
Section: Introductionmentioning
confidence: 99%