Information Security Games: A Survey

03/03/2021
by   Erick Galinkin, et al.
0

We introduce some preliminaries about game theory and information security. Then surveying a subset of the literature, we identify opportunities for future research.

READ FULL TEXT
research
10/18/2019

Blameworthiness in Security Games

Security games are an example of a successful real-world application of ...
research
06/23/2020

A survey of repositories in graph theory

Since the pioneering work of R. M. Foster in the 1930s, many graph repos...
research
12/17/2022

A Survey on Password Guessing

Text password has served as the most popular method for user authenticat...
research
05/25/2021

Securing Serverless Computing: Challenges, Solutions, and Opportunities

Serverless computing is a new cloud service model that reduces both clou...
research
11/22/2021

Convergence of sequences: a survey

Convergent sequences of real numbers play a fundamental role in many dif...
research
11/05/2020

Towards a Theory of Special-purpose Program Obfuscation

Most recent theoretical literature on program obfuscation is based on no...
research
09/01/2020

"It's Unwieldy and It Takes a Lot of Time." Challenges and Opportunities for Creating Agents in Commercial Games

Game agents such as opponents, non-player characters, and teammates are ...

Please sign up or login with your details

Forgot password? Click here to reset