What is it about?

In this survey, we review the existing game-theoretic approaches for cyber security and privacy issues, categorizing their application into two classes, security and privacy. To show how game theory is utilized in cyberspace security and privacy, we select research regarding three main applications: cyber-physical security, communication security, and privacy.

Featured Image

Why is it important?

This survey not only demonstrates how to employ game-theoretic approaches to security and privacy but also encourages researchers to employ game theory to establish a comprehensive understanding of emerging security and privacy problems in cyberspace and potential solutions.

Perspectives

We have been comprehensively reviewed recent applications of game theory for cyber security and privacy. Our goal is to help the reader to have a good familiarity with cutting-edge works and various game-theoretic pproaches to investigate cyberspace security and privacy issues.

The Cuong Do
Kyung Hee University

Read the Original

This page is a summary of: Game Theory for Cyber Security and Privacy, ACM Computing Surveys, March 2018, ACM (Association for Computing Machinery),
DOI: 10.1145/3057268.
You can read the full text:

Read

Contributors

The following have contributed to this page