Filters








44,861 Hits in 3.0 sec

Defendable Security in Interaction Protocols [chapter]

Wojciech Jamroga, Matthijs Melissen, Henning Schnoor
<span title="">2013</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
We study the security of interaction protocols when incentives of participants are taken into account.  ...  Then, the security level can be defined in terms of defender sets, i.e., sets of participants who can effectively "defend" the security property as long as they are in favor of the property.  ...  Game Theoretic Models of Interaction We use normal-form games as abstract models of interaction in a protocol. Definition 1 (Frames and games).  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-44927-7_10">doi:10.1007/978-3-642-44927-7_10</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/idmyijdtmnawfj5g6ogsnz33ma">fatcat:idmyijdtmnawfj5g6ogsnz33ma</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170811074255/http://krak.ipipan.waw.pl/~wjamroga/papers/incentives13prima.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/e9/76/e976c954dda91235f87eb3cd139c7c37061ce05a.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-44927-7_10"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

On Defendability of Security Properties

Wojciech Jamroga, Matthijs Melissen, Henning Schnoor
<span title="2014-04-01">2014</span> <i title="Open Publishing Association"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/qzezkwolyvf33pglm2jldjklca" style="color: black;">Electronic Proceedings in Theoretical Computer Science</a> </i> &nbsp;
Then, the security level can be defined in terms of defender sets, i.e., sets of participants who can effectively "defend" the security property as long as they are in favor of the property.  ...  We study the security of interaction protocols when incentives of participants are taken into account.  ...  Addressing the fundamental ones was not possible in this extended abstract due to space and time constraints, but we will use them in the journal version of the paper (in preparation).  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.4204/eptcs.146.3">doi:10.4204/eptcs.146.3</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/avq4kp32irhmrijr3o4gccylrq">fatcat:avq4kp32irhmrijr3o4gccylrq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200910110208/https://arxiv.org/pdf/1404.0836v1.pdf" title="fulltext PDF download [not primary version]" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <span style="color: #f43e3e;">&#10033;</span> <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/58/59/585914867e1e2802f65815edb66d0c2bd45ecbc1.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.4204/eptcs.146.3"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

A framework for resilient remote monitoring

Michael Atighetchi, Aaron Adler
<span title="">2014</span> <i title="IEEE"> 2014 7th International Symposium on Resilient Control Systems (ISRCS) </i> &nbsp;
access to cyber observables in a secure and resilient way.  ...  Today's activities in cyber space are more connected than ever before, driven by the ability to dynamically interact and share information with a changing set of partners over a wide variety of networks  ...  INTRODUCTION System administrators and cyber defenders continue to face challenges in securing systems in enterprise environments as attacks keep increasing in the level of sophistication and as the number  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/isrcs.2014.6900090">doi:10.1109/isrcs.2014.6900090</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/kxu5vsts6nfw5phnff6jkkdtba">fatcat:kxu5vsts6nfw5phnff6jkkdtba</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170226020259/http://www.dtic.mil/dtic/tr/fulltext/u2/a610309.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/99/56/99563aeca650ef2cc92fe62af4c46a08f93a47b2.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/isrcs.2014.6900090"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

PRUB: A Privacy Protection Friend Recommendation System Based on User Behavior

Wei Jiang, Ruijin Wang, Zhiyuan Xu, Yaodong Huang, Shuo Chang, Zhiguang Qin
<span title="">2016</span> <i title="Hindawi Limited"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/wpareqynwbgqdfodcyhh36aqaq" style="color: black;">Mathematical Problems in Engineering</a> </i> &nbsp;
In this paper, we aim to design a secure friend recommendation system based on the user behavior, called PRUB.  ...  ZYGX2014J051 and ZYGX2014J066), Science and Postdoctoral Fund in China (2015M572464), and Technology Projects in Sichuan Province (2015JY0178) and the project sponsored by OATF, UESTC.  ...  Particularly in the distributed systems, because there are no regulators in the interactive process, the privacy security will be a problem.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1155/2016/8575187">doi:10.1155/2016/8575187</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/og4ukehh6nfablgia3aizpvo2a">fatcat:og4ukehh6nfablgia3aizpvo2a</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190226144101/http://pdfs.semanticscholar.org/8013/4f7b3ba7b84486a0cb334497f0463beedcf8.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/80/13/80134f7b3ba7b84486a0cb334497f0463beedcf8.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1155/2016/8575187"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> hindawi.com </button> </a>

User Revocation Mechanism for Service Oriented Wireless Adhoc Networks

Reddi Prasadu, M. Jeevan Babu, Sk. Mohammed Gouse, Debnath Bhattacharyya, Tai-hoon Kim
<span title="2016-06-30">2016</span> <i title="Science and Engineering Research Support Society"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/4h7flaxsjnh6he3qbiwvxbekxe" style="color: black;">International Journal of Security and Its Applications</a> </i> &nbsp;
To revoke the attacker from participating in the network, User revocation mechanism is contributed to the proposed security protocol.  ...  To solve the above issue, a novel security protocol is proposed for the Passionate network formation. Initial network formation done based on trust.  ...  This helps in establishing basic services and security infrastructure. For this purpose we can use the human interactions associated with the activity.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.14257/ijsia.2016.10.6.05">doi:10.14257/ijsia.2016.10.6.05</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/mfhc4uf4hnbajdvj6e34d3yy6e">fatcat:mfhc4uf4hnbajdvj6e34d3yy6e</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180604032030/http://www.sersc.org/journals/IJSIA/vol10_no6_2016/5.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/9d/71/9d719534fb79a3cabe4e20c13d27c3c6c5013204.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.14257/ijsia.2016.10.6.05"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Trust-Based Attack and Defense in Wireless Sensor Networks: A Survey

Weidong Fang, Wuxiong Zhang, Wei Chen, Tao Pan, Yepeng Ni, Yinxuan Yang
<span title="2020-09-10">2020</span> <i title="Hindawi Limited"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/6o4hgxplrbehxg4t53ub7zmfha" style="color: black;">Wireless Communications and Mobile Computing</a> </i> &nbsp;
As a key component of the information sensing and aggregating for big data, cloud computing, and Internet of Things (IoT), the information security in wireless sensor network (WSN) is critical.  ...  Due to constrained resources of sensor node, WSN is becoming a vulnerable target to many security attacks. Compared to external attacks, it is more difficult to defend against internal attacks.  ...  In this regard, scholars focus on ensuring that sensed data is transmitted by the effective security schemes (e.g., secure routing protocol [6] , security data fusion [7] , and secure network coding  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1155/2020/2643546">doi:10.1155/2020/2643546</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/l4zu6xoo7bc5bptvbjsqagowze">fatcat:l4zu6xoo7bc5bptvbjsqagowze</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200919015639/http://downloads.hindawi.com/journals/wcmc/2020/2643546.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/94/f4/94f4aaba4422c42d788daa02f655187f5f474fd1.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1155/2020/2643546"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> hindawi.com </button> </a>

DEFenD: A Secure and Privacy-Preserving Decentralized System for Freight Declaration [article]

Daniël Vos, Leon Overweel, Wouter Raateland, Jelle Vos, Matthijs Bijman, Max Pigmans, Zekeriya Erkin
<span title="2018-03-25">2018</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
Therefore we propose an alternative: DEFenD, a decentralized system that stores data about goods and containers in a secure and privacy-preserving manner.  ...  We also present a reference implementation built with Hyperledger Fabric and analyze to what extent our implementation meets the requirements in terms of privacy-preservation, security, scalability, and  ...  In DEFEND, economic operators make claims about the packages of goods and containers with which they interact, customs agencies validate those claims.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1803.09257v1">arXiv:1803.09257v1</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/bnoypvqqkzaarplzaddjdokphe">fatcat:bnoypvqqkzaarplzaddjdokphe</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200930025915/https://arxiv.org/pdf/1803.09257v1.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/5b/9c/5b9c203dbe31cff3ec1c12b7e80e7b4fc5a1994d.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1803.09257v1" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

Game theory meets network security and privacy

Mohammad Hossein Manshaei, Quanyan Zhu, Tansu Alpcan, Tamer Bacşar, Jean-Pierre Hubaux
<span title="2013-06-01">2013</span> <i title="Association for Computing Machinery (ACM)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/eiea26iqqjcatatlgxdpzt637y" style="color: black;">ACM Computing Surveys</a> </i> &nbsp;
A selected set of works are presented to highlight the application of game theory in order to address different forms of security and privacy problems in computer networks and mobile applications.  ...  In each category, security problems, players, and game models are identified and the main results of selected works, such as equilibrium analysis and security mechanism designs are summarized.  ...  As a special case, security games study the interaction between malicious attackers and defenders.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/2480741.2480742">doi:10.1145/2480741.2480742</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/55ixmohvijaelflxqrrbtnvfuu">fatcat:55ixmohvijaelflxqrrbtnvfuu</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170829115814/http://publish.illinois.edu/quanyanzhu/files/2012/10/ACMSurvey.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/e2/25/e225752d0209be490905c891ebc9ece65549c1e5.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/2480741.2480742"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> acm.org </button> </a>

Non-collaborative Attackers and How and Where to Defend Flawed Security Protocols (Extended Version) [article]

Michele Peroli, Luca Viganò, Matteo Zavatteri
<span title="2014-05-27">2014</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
We study not only how but also where we can attempt to defend flawed security protocols: we investigate the different network topologies that make security protocol defense feasible and illustrate our  ...  Security protocols are often found to be flawed after their deployment.  ...  In a nutshell: there we discussed the how we can defend flawed security protocols and here we discuss the where.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1405.6912v1">arXiv:1405.6912v1</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/7fbl6v6ogvd63ivo6q6lhhwksm">fatcat:7fbl6v6ogvd63ivo6q6lhhwksm</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200826220418/https://arxiv.org/pdf/1405.6912v1.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/08/bf/08bfdcf89e79e88e82f2c4072cb369af9ce11d0c.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1405.6912v1" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

How to Authenticate a Device? Formal Authentication Models for M2M Communications Defending against Ghost Compromising Attack

Wei Ren, Linchen Yu, Liangli Ma, Yi Ren
<span title="">2013</span> <i title="SAGE Publications"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/snvb3djywzbhvjtue42hxtjery" style="color: black;">International Journal of Distributed Sensor Networks</a> </i> &nbsp;
Our models present soundness and completeness in terms of authentication security, which can guide the design and analysis of concrete authentication protocols.  ...  We proof the authentication security for all proposed models and compare them for clarity.  ...  Security of Authentication of Protocol Π in the presence of adversary A.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1155/2013/679450">doi:10.1155/2013/679450</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/vtwroczryrhoznqcx64hiw2s6q">fatcat:vtwroczryrhoznqcx64hiw2s6q</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170812115540/https://ir.nctu.edu.tw/bitstream/11536/21270/1/000315231700001.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/75/e4/75e4899b2f21f1bd37a0d2088a703da0f90036aa.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1155/2013/679450"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> hindawi.com </button> </a>

Lightweight Key Distribution Protocol for Streaming Media DRM

Hao Li, Tang Xuyue, Jiayin Tian, Jianbo Liu, Cheng Yang
<span title="2016-09-30">2016</span> <i title="Science and Engineering Research Support Society"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/4h7flaxsjnh6he3qbiwvxbekxe" style="color: black;">International Journal of Security and Its Applications</a> </i> &nbsp;
Besides, we raise up a new protocol based on the IKEV2 distribution protocol and evaluate the stability when it suffer the Man-in -the-Middle Attacks, DoS and Replay attacks.  ...  The process about the generation, distribution, storage, and the revocation of the key is the core problem in the system-security consideration.  ...  Therefore we proposed two different sets of key distribution protocols for the different situations in this paper.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.14257/ijsia.2016.10.9.26">doi:10.14257/ijsia.2016.10.9.26</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/a3d7gm2qzrekbcrgvcp3y2xgpy">fatcat:a3d7gm2qzrekbcrgvcp3y2xgpy</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20220228113632/http://article.nadiapub.com/IJSIA/vol10_no9/26.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/15/d5/15d5535556cd43bc82f1acd99ccaee03dfbcaf15.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.14257/ijsia.2016.10.9.26"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Security Protocols as Environments: a Lesson from Non-collaboration

Michele Peroli, Luca Vigano', Maria-Camilla Fiazza
<span title="">2011</span> <i title="IEEE"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/pzyiigk6mnbcfmpdtfilb6u2hu" style="color: black;">Proceedings of the 7th International Conference on Collaborative Computing: Networking, Applications and Worksharing</a> </i> &nbsp;
Defending security protocols through interference between attackers is possible; however, in order to understand network behavior completely, it is necessary to start treating protocols as environments  ...  Although computer security typically revolves around threats, attacks and defenses, the sub-field of security protocol analysis (SPA) has so far focused almost exclusively on attacks.  ...  ACKNOWLEDGEMENTS The work presented in this paper was partially supported by the FP7-ICT-2009-5 Project no. 257876, "SPaCIoS: Secure Provision and Consumption in the Internet of Services" (www.spacios.eu  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.4108/icst.collaboratecom.2011.247156">doi:10.4108/icst.collaboratecom.2011.247156</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/colcom/FiazzaPV11.html">dblp:conf/colcom/FiazzaPV11</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/7nnjsgoeizaklezbaoymdynzti">fatcat:7nnjsgoeizaklezbaoymdynzti</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200306221216/https://eudl.eu/pdf/10.4108/icst.collaboratecom.2011.247156" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/af/b8/afb8a35ab250f86506bba51c65a10343bbc9e42a.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.4108/icst.collaboratecom.2011.247156"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

DSGM-Based Analysis of Computer Networks Security

Boniface Kayode Alese, Iwasokun Gabriel Babatunde, Haruna Danjuma Israel
<span title="2013-12-01">2013</span> <i title="Infonomics Society"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/kiaw6zohx5ch3eplop5vdegjay" style="color: black;">International Journal for Information Security Research</a> </i> &nbsp;
The interaction between an attacker and a defender is viewed as two-player non-zero deterministic game whose model is constructed using a saddle point solution (non-linear program) to compute the value  ...  Network security attacks target the following key elements of the network security architecture [8]:  ...  Figure 5 : 5 Chart of attacker-defender interaction for game 4. Figure 6 : 6 Chart of attacker-defender interaction for game 10.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.20533/ijisr.2042.4639.2013.0043">doi:10.20533/ijisr.2042.4639.2013.0043</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/zyvrxrpuzbah3isbxi22czoa5m">fatcat:zyvrxrpuzbah3isbxi22czoa5m</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180602183217/http://infonomics-society.org/wp-content/uploads/ijisr/published-papers/volume-3-2013/DSGM-Based-Analysis-of-Computer-Networks-Security.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/97/e4/97e4455cd6c1edc94e87bcf4118ca46b1c822b89.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.20533/ijisr.2042.4639.2013.0043"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Secure Message Delivery Games for Device-to-Device Communications [chapter]

Emmanouil Panaousis, Tansu Alpcan, Hossein Fereidooni, Mauro Conti
<span title="">2014</span> <i title="Springer International Publishing"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
To this end, we propose the Secure Message Delivery (SMD) protocol, whose main functionality is determined by the solution of the Secure Message Delivery Game (SMDG).  ...  Each device can run different kinds of mobile security software, which offer protection against viruses and other harmful programs by using real-time scanning in every file entering the device.  ...  Secure Message Delivery Games In this section, we use game theory to model the interactions between a D2D network (the defender ) and any adversarial entity (the attacker ).  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-319-12601-2_11">doi:10.1007/978-3-319-12601-2_11</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/tdbjt3davfajbiqvuxtzcjmcyu">fatcat:tdbjt3davfajbiqvuxtzcjmcyu</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170921200927/http://eprints.brighton.ac.uk/13595/1/PAFC14gamesec.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/61/3d/613dc96da5dd71440b3b6e58d7bbd7697b2c82cc.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-319-12601-2_11"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Stackelberg Security Game For Optimizing Security Of Federated Internet Of Things Platform Instances

Violeta Damjanovic-Behrendt
<span title="2017-03-01">2017</span> <i title="Zenodo"> Zenodo </i> &nbsp;
Naïve Q-Learning belongs to the category of active and model-free Machine Learning (ML) techniques in which the agent (either the defender or the attacker) attempts to find an optimal security solution  ...  In this way, we combine GT and ML algorithms for discovering optimal cyber security policies.  ...  In our game, we are focused on repeated interaction scenarios between defenders and attackers in the cloud. Our work follows Repeated SSG and a model called Stochastic SHARP [49] .  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5281/zenodo.1130143">doi:10.5281/zenodo.1130143</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/ioupac6cbvaz3lftjcptnz5aru">fatcat:ioupac6cbvaz3lftjcptnz5aru</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200222105309/https://zenodo.org/record/1130143/files/10006948.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/d4/aa/d4aa4295d7556fb85d6542a1af88adab5d577032.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5281/zenodo.1130143"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> zenodo.org </button> </a>
&laquo; Previous Showing results 1 &mdash; 15 out of 44,861 results