Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Cyber Deception Against Zero-Day Attacks: A Game Theoretic Approach

    Reconnaissance activities precedent other attack steps in the cyber kill chain. Zero-day attacks exploit unknown vulnerabilities and give attackers the upper hand against conventional defenses. Honeypots have ...

    Md Abu Sayed, Ahmed H. Anwar in Decision and Game Theory for Security (2023)

  2. No Access

    Chapter and Conference Paper

    A Network Centrality Game for Epidemic Control

    Many epidemic networks admit the partition of the population into three compartments of respective susceptible, infected, and removed individuals. These epidemics involve a conflict between the agent who is pr...

    Olivier Tsemogne, Willie Kouam, Ahmed H. Anwar in Decision and Game Theory for Security (2023)

  3. No Access

    Chapter and Conference Paper

    Optimizing Intrusion Detection Systems Placement Against Network Virus Spreading Using a Partially Observable Stochastic Minimum-Threat Path Game

    Intrusion Detection Systems (IDS) are security tools that aim to detect tentative of virus propagation between two interconnected devices. As the propagation of a virus or malware is dynamic and can be strateg...

    Olivier Tsemogne, Yezekael Hayel, Charles Kamhoua in Decision and Game Theory for Security (2023)