Attack--Defense Trees and Two-Player Binary Zero-Sum Extensive Form Games Are Equivalent
Barbara KordySjouke MauwMatthijs MelissenPatrick SchweitzerPublished in: CoRR (2010)
Keyphrases
- extensive form games
- stochastic games
- repeated games
- nash equilibria
- ddos attacks
- defense mechanisms
- nash equilibrium
- perfect information
- incomplete information
- binary tree
- binary trees
- decision trees
- tree representation
- influence diagrams
- game theory
- tree structure
- countermeasures
- game theoretic
- intrusion detection
- network security
- imperfect information
- advanced research projects agency
- multi agent
- secret key
- optimal strategy
- cyber attacks
- single agent