2015
DOI: 10.1007/978-3-319-25594-1_20
|View full text |Cite
|
Sign up to set email alerts
|

Uncertainty in Games: Using Probability-Distributions as Payoffs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
26
0

Year Published

2018
2018
2020
2020

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 24 publications
(27 citation statements)
references
References 2 publications
0
26
0
Order By: Relevance
“…The technicalities and theory behind the stochastic ordering and construction of stochastic games are of no interest in this work, but we refer the interested reader to the papers (Rass et al 2016; for more details. For example, (Rass et al 2015) reconstructs the entire theory of games based on any total stochastic order, such as the presented -order.…”
Section: Security Game Modelmentioning
confidence: 99%
“…The technicalities and theory behind the stochastic ordering and construction of stochastic games are of no interest in this work, but we refer the interested reader to the papers (Rass et al 2016; for more details. For example, (Rass et al 2015) reconstructs the entire theory of games based on any total stochastic order, such as the presented -order.…”
Section: Security Game Modelmentioning
confidence: 99%
“…The identification and analysis of composite interdependencies between supply chain entities and their cyber-assets drive the process of assessing the propagation of incidents through multiple ICT networks. An application of game-theoretic algorithms yields the recognition of optimal mitigation actions, capturing a worst-case scenario damage for the defender, based on the game-theoretic risk management approach described in Reference [59], the mathematical module for uncertain payoffs described in Reference [60] and potential attack strategies presented in References [57,58,61]. In this context, the MITIGATE methodology focuses on the following objectives:…”
Section: An Evidence-driven Holistic Approachmentioning
confidence: 99%
“…The modeling of supply chain services elicits information about the main cyberdependencies that exist among assets. A cyberdependency of assets is considered a pair cyber-asset (node) interrelation and/or interconnection (edge) aiming to fulfil an electronic service/operation across communication networks [55,59]. The MITIGATE methodology assumes a twofold dependency concept: (i) The dependency type and (ii) the dependency access vector.…”
Section: A Novel Integrated Risk Management System and Servicesmentioning
confidence: 99%
See 2 more Smart Citations