When the Winning Move is Not to Play: Games of Deterrence in Cyber Security.
Chad HeitzenraterGreg TaylorAndrew SimpsonPublished in: GameSec (2015)
Keyphrases
- cyber security
- human players
- game playing
- smart grid
- intrusion detection
- imperfect information
- cyber attacks
- computer games
- senior citizens
- intrusion detection system
- security issues
- critical infrastructure
- network security
- countermeasures
- human computation
- video games
- evaluation function
- counter terrorism
- security and privacy issues
- fuzzy logic
- visual analytics
- game play
- anomaly detection
- information systems
- educational games
- rapid development
- computer networks
- network traffic
- power system
- association rules