Vis enkel innførsel

dc.contributor.authorHausken, Kjell
dc.contributor.authorWelburn, Jonathan William
dc.contributor.authorZhuang, Jun
dc.date.accessioned2024-08-20T08:49:21Z
dc.date.available2024-08-20T08:49:21Z
dc.date.created2024-08-07T20:10:39Z
dc.date.issued2024-08
dc.identifier.citationHausken, K., Welburn, J. W., & Zhuang, J. (2024). A Review of Attacker–Defender Games and Cyber Security. Games, 15(4), 28en_US
dc.identifier.issn2073-4336
dc.identifier.urihttps://hdl.handle.net/11250/3147083
dc.description.abstractThe focus of this review is the long and broad history of attacker–defender games as a foundation for the narrower and shorter history of cyber security. The purpose is to illustrate the role of game theory in cyber security and which areas have received attention and to indicate future research directions. The methodology uses the search terms game theory, attack, defense, and cyber security in Web of Science, augmented with the authors’ knowledge of the field. Games may involve multiple attackers and defenders over multiple periods. Defense involves security screening and inspection, the detection of invaders, jamming, secrecy, and deception. Incomplete information is reviewed due to its inevitable presence in cyber security. The findings pertain to players sharing information weighted against the security investment, influenced by social planning. Attackers stockpile zero-day cyber vulnerabilities. Defenders build deterrent resilient systems. Stochastic cyber security games play a role due to uncertainty and the need to build probabilistic models. Such games can be further developed. Cyber security games based on traffic and transportation are reviewed; they are influenced by the more extensive communication of GPS data. Such games should be extended to comprise air, land, and sea. Finally, cyber security education and board games are reviewed, which play a prominent role.en_US
dc.language.isoengen_US
dc.publisherMDPIen_US
dc.rightsNavngivelse 4.0 Internasjonal*
dc.rights.urihttp://creativecommons.org/licenses/by/4.0/deed.no*
dc.subjectgame theoryen_US
dc.subjectspillteorien_US
dc.titleA Review of Attacker-Defender Games and Cyber Securityen_US
dc.typePeer revieweden_US
dc.typeJournal articleen_US
dc.description.versionpublishedVersionen_US
dc.rights.holder© 2024 by the author(s).en_US
dc.subject.nsiVDP::Teknologi: 500en_US
dc.source.pagenumber1-27en_US
dc.source.volume15en_US
dc.source.journalGamesen_US
dc.source.issue4en_US
dc.identifier.doi10.3390/g15040028
dc.identifier.cristin2285073
dc.source.articlenumber28en_US
cristin.ispublishedtrue
cristin.fulltextoriginal
cristin.qualitycode1


Tilhørende fil(er)

Thumbnail

Denne innførselen finnes i følgende samling(er)

Vis enkel innførsel

Navngivelse 4.0 Internasjonal
Med mindre annet er angitt, så er denne innførselen lisensiert som Navngivelse 4.0 Internasjonal