Game Theory for Cyber Security and Privacy.
Cuong T. DoNguyen H. TranChoong Seon HongCharles A. KamhouaKevin A. KwiatErik BlaschShaolei RenNiki PissinouSundaraja Sitharama IyengarPublished in: ACM Comput. Surv. (2017)
Keyphrases
- game theory
- cyber security
- security issues
- security and privacy issues
- smart grid
- game theoretic
- cyber attacks
- intrusion detection
- cooperative
- multi agent systems
- nash equilibrium
- information security
- critical infrastructure
- privacy preserving
- resource allocation
- intrusion detection system
- statistical physics
- privacy concerns
- nash equilibria
- fictitious play
- cloud computing
- information technology
- visual analytics
- private information
- personal information
- personal data
- privacy protection
- anomaly detection
- power system
- solution concepts
- evolutionary game theory
- network security
- learning algorithm