What is it about?
In this survey, we review the existing game-theoretic approaches for cyber security and privacy issues, categorizing their application into two classes, security and privacy. To show how game theory is utilized in cyberspace security and privacy, we select research regarding three main applications: cyber-physical security, communication security, and privacy.
Featured Image
Photo by FLY:D on Unsplash
Why is it important?
This survey not only demonstrates how to employ game-theoretic approaches to security and privacy but also encourages researchers to employ game theory to establish a comprehensive understanding of emerging security and privacy problems in cyberspace and potential solutions.
Perspectives
Read the Original
This page is a summary of: Game Theory for Cyber Security and Privacy, ACM Computing Surveys, March 2018, ACM (Association for Computing Machinery),
DOI: 10.1145/3057268.
You can read the full text:
Contributors
The following have contributed to this page