A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Game Theory Meets Information Security Management
[chapter]
2014
IFIP Advances in Information and Communication Technology
This work addresses the challenge "how do we make better security decisions?" and it develops techniques to support human decision making and algorithms which enable well-founded cyber security decisions to be made. In this paper we propose a game theoretic model which optimally allocates cyber security resources such as administrators' time across different tasks. We first model the interactions between an omnipresent attacker and a team of system administrators seen as the defender, and we
doi:10.1007/978-3-642-55415-5_2
fatcat:5gnkkdfyjfg3rmmnqktjgdfmse