Journal of Computer Engineering & Information TechnologyISSN : 2324-9307

All submissions of the EM system will be redirected to Online Manuscript Submission System. Authors are requested to submit articles directly to Online Manuscript Submission System of respective journal.
rolex replica best fake rolex replica rolex deneme bonusu veren siteler

A Game-theoretic Scenario for Modelling the Attacker-Defender Interaction

A Game-theoretic Scenario for Modelling the Attacker-Defender Interaction

Existing computer security techniques lack the quantitative decision framework required to defend against highly organized attacks. Game theory provides a set of quantitative and analytical tools for describing and analyzing interactive decision situations in computer security. Recently, game-theoretic approaches such as stochastic security games have been used to study security problems as an optimization game comprising multiple players notably the attackers and the defenders (system administrators).

Special Features

Full Text

View

Track Your Manuscript

Media Partners

GET THE APP