Incorporating risk preferences into a defense-attack game.
Xiaoxiong ZhangKun DingHui ZhangGuoquan JiangPublished in: SMC (2020)
Keyphrases
- ddos attacks
- decision making
- defense mechanisms
- game theory
- video games
- computer games
- educational games
- game playing
- countermeasures
- dos attacks
- risk assessment
- game play
- network security
- serious games
- game design
- cooperative game
- intrusion detection
- user preferences
- nash equilibria
- nash equilibrium
- risk management
- game development
- high risk
- virtual world
- boolean games
- risk analysis
- game based learning
- game theoretic
- multi attribute
- soft constraints
- imperfect information
- cyber attacks
- optimal strategy