Game Theory in Cyber Security

  • Pál Koudela
Keywords: Cyber security, network security, game theory, securing infrastructure, securing services

Abstract

Modelling conflicts in virtual space, defence and security policy and law enforcement face situations of insufficient i.e. incomplete information environment. Infrastructural environment and conflict models, developed in the Cold War environment, flourish today. The accelerated growth and development of conditions and services on the World Wide Web, the proliferation of anonymous and self-organizing networks, and mobile devices present new challenges.

Published
2019-12-31
Section
Haditechnika