Showing 1 - 5 of 5
The focus of this review is the long and broad history of attacker-defender games as a foundation for the narrower and shorter history of cyber security. The purpose is to illustrate the role of game theory in cyber security and which areas have received attention and to indicate future research...
Persistent link: https://www.econbiz.de/10015271344
A four period game between two firms and two hackers is analyzed. The firms first defend and the hackers thereafter attack and share information. Each hacker seeks financial gain, beneficial information exchange, and reputation gain. The two hackers’ attacks and the firms’ defenses are...
Persistent link: https://www.econbiz.de/10011708862
A model is developed for two players exerting media manipulation efforts to support each of two actors who interact controversially. Early evidence may support one actor, while the full evidence emerging later may support the other actor. Exerting effort when the full evidence exceeds (falls...
Persistent link: https://www.econbiz.de/10012167778
In a two-period game, Player 1 produces zero-day exploits for immediate deployment or stockpiles for future deployment. In Period 2, Player 1 produces zero-day exploits for immediate deployment, supplemented by stockpiled zero-day exploits from Period 1. Player 2 defends in both periods. The...
Persistent link: https://www.econbiz.de/10012432466
A game between a representative household and a government was analyzed. The household chose which fractions of two currencies to hold, e.g., a national currency such as a Central Bank Digital Currency (CBDC) and a global currency such as Bitcoin or Facebook's Diem, and chose the tax evasion...
Persistent link: https://www.econbiz.de/10012503796