eprintid: 10037804
rev_number: 19
eprint_status: archive
userid: 608
dir: disk0/10/03/78/04
datestamp: 2018-02-01 16:39:52
lastmod: 2020-02-20 04:06:19
status_changed: 2018-02-01 16:39:52
type: article
metadata_visibility: show
creators_name: Spring, JM
title: Toward Realistic Modeling Criteria of Games in Internet Security
ispublished: pub
divisions: UCL
divisions: A01
divisions: B04
divisions: C05
divisions: F48
note: This version is the version of record. For information on re-use, please refer to the publisher’s terms and conditions.
abstract: There have been various attempts to apply game theory to various aspects of security situations. This article is particularly interested in security as relates to computers and the Internet. While there have been varying levels of success in describing different aspects of security in game-theoretic terms, there has been little success in describing the problem on a large scale that would be appropriate for making decisions about enterprise or Internet security policy. This article attempts to provide such a description.
date: 2014-09-01
date_type: published
publisher: Cyber Security and Information Systems Information Analysis Center
official_url: https://www.csiac.org/journal-issue/games-people-play-behavior-and-security/
oa_status: green
full_text_type: pub
language: eng
primo: open
primo_central: open_green
article_type_text: Article
verified: verified_manual
elements_id: 1509287
lyricists_name: Spring, Jonathan
lyricists_id: JSPRI00
actors_name: Spring, Jonathan
actors_id: JSPRI00
actors_role: owner
full_text_status: public
publication: Journal of Cyber Security and Information Systems
volume: 2
number: 2
pagerange: 2-12
citation:        Spring, JM;      (2014)    Toward Realistic Modeling Criteria of Games in Internet Security.                   Journal of Cyber Security and Information Systems , 2  (2)   pp. 2-12.          Green open access   
 
document_url: https://discovery.ucl.ac.uk/id/eprint/10037804/1/spring_2014_games-and-internet-security.pdf