2018
DOI: 10.1007/978-3-030-01554-1_36
|View full text |Cite
|
Sign up to set email alerts
|

An Initial Study of Targeted Personality Models in the FlipIt Game

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
3
3
3

Relationship

2
7

Authors

Journals

citations
Cited by 17 publications
(6 citation statements)
references
References 17 publications
0
6
0
Order By: Relevance
“…While BSMGs allow us to represent uncertainty over attacker types, existing formulations consider single follower types, thereby boiling down to an MG. Although we will use an MG for this scenario, we note that our framework is capable of incorporating ongoing research on the characterizing attacker types in the context of cyber-systems [28].…”
Section: Modeling Moving Target Defense Scenarios As Bsmgsmentioning
confidence: 99%
“…While BSMGs allow us to represent uncertainty over attacker types, existing formulations consider single follower types, thereby boiling down to an MG. Although we will use an MG for this scenario, we note that our framework is capable of incorporating ongoing research on the characterizing attacker types in the context of cyber-systems [28].…”
Section: Modeling Moving Target Defense Scenarios As Bsmgsmentioning
confidence: 99%
“…The game analysis provides a risk assessment of the system and the development of defense strategies. The applications of FlipIt games have been extended to many applications including cloud computing [20,91,137], cybercrime [6,11], and IoT systems [21,87].…”
Section: Multi-stage and Multi-phase Gamesmentioning
confidence: 99%
“…Most of these studies originate from speculative actions and responses to questions. Participants are typically drawn from Amazon Mechanical Turk (AMT), in which the target population does not possess technical or cybersecurity training and qualifications [1][2][3]. The resulting datasets and models built from these studies fail to capture interactions of attackers and defenders with real systems and networks.…”
Section: Introductionmentioning
confidence: 99%