Are We Compromised? Modelling Security Assessment Games.
Viet PhamCarlos CidPublished in: IACR Cryptol. ePrint Arch. (2012)
Keyphrases
- risk assessment
- information security
- security requirements
- security issues
- information assurance
- network security
- security policies
- statistical databases
- intrusion detection
- security systems
- computer games
- security measures
- serious games
- security threats
- computer security
- access control
- video games
- learning games
- cyber security
- game theoretic
- data mining
- security mechanisms
- functional requirements
- information systems
- decision making
- game playing
- cooperative
- educational games
- game theory