Interdependent Defense Games: Modeling Interdependent Security under Deliberate Attacks
Hau ChanMichael CeykoLuis E. OrtizPublished in: CoRR (2012)
Keyphrases
- network security
- defense mechanisms
- intrusion detection
- security threats
- security problems
- security measures
- security vulnerabilities
- security mechanisms
- computer security
- ddos attacks
- security risks
- security breaches
- insider attacks
- malicious attacks
- security protocols
- information security
- security management
- stream cipher
- java card
- cyber attacks
- cyber defense
- malicious users
- computer virus
- security flaws
- computer games
- computer networks
- identity theft
- security issues
- security requirements
- biometric template
- information leakage
- educational games
- secure routing
- access control
- intrusion detection and prevention
- chosen plaintext