![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
Cyber Deception Against Zero-Day Attacks: A Game Theoretic Approach
Reconnaissance activities precedent other attack steps in the cyber kill chain. Zero-day attacks exploit unknown vulnerabilities and give attackers the upper hand against conventional defenses. Honeypots have ...
-
Chapter and Conference Paper
A Network Centrality Game for Epidemic Control
Many epidemic networks admit the partition of the population into three compartments of respective susceptible, infected, and removed individuals. These epidemics involve a conflict between the agent who is pr...
-
Chapter and Conference Paper
Optimizing Intrusion Detection Systems Placement Against Network Virus Spreading Using a Partially Observable Stochastic Minimum-Threat Path Game
Intrusion Detection Systems (IDS) are security tools that aim to detect tentative of virus propagation between two interconnected devices. As the propagation of a virus or malware is dynamic and can be strateg...