Game Theory in Cyber Security
Keywords:
Cyber security, network security, game theory, securing infrastructure, securing services
Abstract
Modelling conflicts in virtual space, defence and security policy and law enforcement face situations of insufficient i.e. incomplete information environment. Infrastructural environment and conflict models, developed in the Cold War environment, flourish today. The accelerated growth and development of conditions and services on the World Wide Web, the proliferation of anonymous and self-organizing networks, and mobile devices present new challenges.