Spring, JM;
(2014)
Toward Realistic Modeling Criteria of Games in Internet Security.
Journal of Cyber Security and Information Systems
, 2
(2)
pp. 2-12.
Preview |
Text
spring_2014_games-and-internet-security.pdf - Published Version Download (5MB) | Preview |
Abstract
There have been various attempts to apply game theory to various aspects of security situations. This article is particularly interested in security as relates to computers and the Internet. While there have been varying levels of success in describing different aspects of security in game-theoretic terms, there has been little success in describing the problem on a large scale that would be appropriate for making decisions about enterprise or Internet security policy. This article attempts to provide such a description.
Type: | Article |
---|---|
Title: | Toward Realistic Modeling Criteria of Games in Internet Security |
Open access status: | An open access version is available from UCL Discovery |
Publisher version: | https://www.csiac.org/journal-issue/games-people-p... |
Language: | English |
Additional information: | This version is the version of record. For information on re-use, please refer to the publisher’s terms and conditions. |
UCL classification: | UCL UCL > Provost and Vice Provost Offices UCL > Provost and Vice Provost Offices > UCL BEAMS UCL > Provost and Vice Provost Offices > UCL BEAMS > Faculty of Engineering Science UCL > Provost and Vice Provost Offices > UCL BEAMS > Faculty of Engineering Science > Dept of Computer Science |
URI: | https://discovery.ucl.ac.uk/id/eprint/10037804 |
Archive Staff Only
View Item |