eprintid: 10037804 rev_number: 19 eprint_status: archive userid: 608 dir: disk0/10/03/78/04 datestamp: 2018-02-01 16:39:52 lastmod: 2020-02-20 04:06:19 status_changed: 2018-02-01 16:39:52 type: article metadata_visibility: show creators_name: Spring, JM title: Toward Realistic Modeling Criteria of Games in Internet Security ispublished: pub divisions: UCL divisions: A01 divisions: B04 divisions: C05 divisions: F48 note: This version is the version of record. For information on re-use, please refer to the publisher’s terms and conditions. abstract: There have been various attempts to apply game theory to various aspects of security situations. This article is particularly interested in security as relates to computers and the Internet. While there have been varying levels of success in describing different aspects of security in game-theoretic terms, there has been little success in describing the problem on a large scale that would be appropriate for making decisions about enterprise or Internet security policy. This article attempts to provide such a description. date: 2014-09-01 date_type: published publisher: Cyber Security and Information Systems Information Analysis Center official_url: https://www.csiac.org/journal-issue/games-people-play-behavior-and-security/ oa_status: green full_text_type: pub language: eng primo: open primo_central: open_green article_type_text: Article verified: verified_manual elements_id: 1509287 lyricists_name: Spring, Jonathan lyricists_id: JSPRI00 actors_name: Spring, Jonathan actors_id: JSPRI00 actors_role: owner full_text_status: public publication: Journal of Cyber Security and Information Systems volume: 2 number: 2 pagerange: 2-12 citation: Spring, JM; (2014) Toward Realistic Modeling Criteria of Games in Internet Security. Journal of Cyber Security and Information Systems , 2 (2) pp. 2-12. Green open access document_url: https://discovery.ucl.ac.uk/id/eprint/10037804/1/spring_2014_games-and-internet-security.pdf