Showing 1 - 5 results of 5 for search '"game theory"', query time: 0.06s Refine Results
  1. 1

    Game theory and machine learning for cyber security /

    Published 2021
    Table of Contents: “…Introduction to game theory / Fei Fang, Shutian Liu, Anjon Basak, Quanyan Zhu, Christopher Kiekintveld, Charles A. …”
    CONNECT
    Electronic eBook
  2. 2

    Assured cloud computing /

    Published 2018
    CONNECT
    Electronic eBook
  3. 3

    Assured cloud computing /

    Published 2018
    CONNECT
    Electronic eBook
  4. 4

    Modeling and design of secure Internet of things /

    Published 2020
    Table of Contents: “…Njilla, Alexander Kott, and Sachin Shetty -- Part I Game Theory for Cyber Deception 27 -- 2 Game-Theoretic Analysis of Cyber Deception: Evidence-Based Strategies and Dynamic Risk Mitigation 29 /Tao Zhang, Linan Huang, Jeffrey Pawlick, and Quanyan Zhu -- 3 A Hypergame-Based Defense Strategy Toward Cyber Deception in Internet of Battlefield Things (IoBT) 59 /Bowei Xi and Charles A. …”
    CONNECT
    Electronic eBook
  5. 5

    Blockchain for distributed systems security /

    Published 2019
    Table of Contents: “…11.1 Introduction 233 -- 11.2 Preliminaries 234 -- 11.2.1 Digital Currencies: Terminologies and Mechanics 234 -- 11.2.2 Game Theory: Basic Notions and Definitions 235 -- 11.3 Literature Review 236 -- 11.4 Reputation-based Mining Model and Setting 238 -- 11.5 Mining in a Reputation-based Model 240 -- 11.5.1 Prevention of the Re-entry Attack 240 -- 11.5.2 Technical Discussion on Detection Mechanisms 241 -- 11.5.3 Colluding Miner s Dilemma 243 -- 11.5.4 Repeated Mining Game 244 -- 11.5.5 Colluding Miners Preferences 245 -- 11.5.6 Colluding Miners Utilities 245 -- 11.6 Evaluation of Our Model Using Game-theoretical Analyses 246 -- 11.7 Concluding Remarks 248 -- Acknowledgment 249 -- References 249 -- Part IV Blockchain Implementation 253 -- 12 Private Blockchain Configurations for Improved IoT Security 255 /Adriaan Larmuseau and Devu Manikantan Shila -- 12.1 Introduction 255 -- 12.2 Blockchain-enabled Gateway 257 -- 12.2.1 Advantages 257 -- 12.2.2 Limitations 258 -- 12.2.3 Private Ethereum Gateways for Access Control 259 -- 12.2.4 Evaluation 262 -- 12.3 Blockchain-enabled Smart End Devices 263 -- 12.3.1 Advantages 263 -- 12.3.2 Limitations 264 -- 12.3.3 Private Hyperledger Blockchain-enabled Smart Sensor Devices 264 -- 12.3.4 Evaluation 269 -- 12.4 Related Work 270 -- 12.5 Conclusion 271 -- References 271 -- 13 Blockchain Evaluation Platform 275 /Peter Foytik and Sachin S. …”
    CONNECT
    Electronic eBook