Trusted Computing vs. Advanced Persistent Threats: Can a Defender Win This Game?
Nikos VirvilisDimitris GritzalisTheodoros K. ApostolopoulosPublished in: UIC/ATC (2013)
Keyphrases
- trusted computing
- game theory
- computer security
- game theoretic
- countermeasures
- computing environments
- nash equilibrium
- computing platform
- stackelberg game
- information security
- trusted platform module
- mixed strategy
- cloud computing
- leader follower
- network security
- virtual organization
- resource allocation
- multi agent systems
- computing systems
- data mining
- message passing
- load balancing
- theoretical framework
- computer systems
- access control
- supply chain