![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
A Game Theoretical Model for Optimal Distribution of Network Security Resources
Enforcing security in a network always comes with a tradeoff regarding budget constraints, entailing unavoidable choices for the deployment of security equipment over the network. Therefore, finding the optima...
-
Chapter and Conference Paper
A Methodology to Apply a Game Theoretic Model of Security Risks Interdependencies Between ICT and Electric Infrastructures
In the last decade, the power grid has increasingly relied on the communication infrastructure for the management and control of grid operations. In a previous work, we proposed an analytical model for identif...
-
Chapter and Conference Paper
An Attack Execution Model for Industrial Control Systems Security Assessment
The improved communication and remote control capabilities of industrial control systems equipment have increased their attack surface. As a result, managing the security risk became a challenging task. The co...
-
Chapter and Conference Paper
Data Integrity and Availability Verification Game in Untrusted Cloud Storage
The recent trends towards outsourcing data to the Cloud as well as various concerns regarding data integrity and availability created an increasing interest in enabling secure Cloud data-centers. Many schemes ...