Interdependent Defense Games: Modeling Interdependent Security under Deliberate Attacks.
Hau ChanMichael CeykoLuis E. OrtizPublished in: UAI (2012)
Keyphrases
- network security
- intrusion detection
- security problems
- information security
- security vulnerabilities
- cyber attacks
- defense mechanisms
- security threats
- computer security
- countermeasures
- cyber defense
- security mechanisms
- security protocols
- access control
- security breaches
- ddos attacks
- fault injection
- security flaws
- security measures
- java card
- security risks
- intrusion prevention
- computer virus
- video games
- security policies
- denial of service attacks
- dos attacks
- computer games
- stream cipher
- malicious users
- game play
- information warfare
- intrusion detection system
- authentication scheme
- game playing
- buffer overflow
- biometric template
- security issues
- key management
- malicious attacks