語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Game Theory Principals for Decision-...
~
Adeniyi, Hammed.
Game Theory Principals for Decision-Making in Cybersecurity.
紀錄類型:
書目-語言資料,手稿 : Monograph/item
正題名/作者:
Game Theory Principals for Decision-Making in Cybersecurity./
作者:
Adeniyi, Hammed.
面頁冊數:
1 online resource (44 pages)
附註:
Source: Masters Abstracts International, Volume: 56-04.
標題:
Information science. -
電子資源:
click for full text (PQDT)
ISBN:
9781369762891
Game Theory Principals for Decision-Making in Cybersecurity.
Adeniyi, Hammed.
Game Theory Principals for Decision-Making in Cybersecurity.
- 1 online resource (44 pages)
Source: Masters Abstracts International, Volume: 56-04.
Thesis (M.S.)--Utica College, 2017.
Includes bibliographical references
Complexities of network intrusion behaviors require a scientific approach where a decision can be quickly quantified, adapted, and applied to attributes of attackers and defenders of systems. Quantitative methods such as Game Theory provide a way to analyze issues, behaviors, and interactions amongst attackers and defenders of the network. Analysts need detailed analysis models that provide deep understanding, prioritization of cyber activities, evaluation of security vulnerabilities/threats/risks, and ability to predict behaviors. Once the behaviors are determined, then an automated action is enacted to countermeasure network intrusion/disruption. As the process is automated and looped back, a learned behavior model is created. This learned behavior becomes the basis for a continuous self-improving decision making network security system.Many factors lead to organizational decision making policies for network security. These factors stem from a root complexity of limited resource allocation and organization's ability to prioritize the range, scale, and profile of unknown attack attributes. Decision roadblocks are greater amongst entities with insufficient resources, which are used to manage threats and activities to reduce network vulnerabilities. As for results, many network security platforms lack the decision capabilities to match adversaries changing behavioral patterns. This research will be used to analyze the application of game theory methods on cybersecurity decision making.
Electronic reproduction.
Ann Arbor, Mich. :
ProQuest,
2018
Mode of access: World Wide Web
ISBN: 9781369762891Subjects--Topical Terms:
561178
Information science.
Index Terms--Genre/Form:
554714
Electronic books.
Game Theory Principals for Decision-Making in Cybersecurity.
LDR
:02621ntm a2200325K 4500
001
912844
005
20180608130008.5
006
m o u
007
cr mn||||a|a||
008
190606s2017 xx obm 000 0 eng d
020
$a
9781369762891
035
$a
(MiAaPQ)AAI10278019
035
$a
(MiAaPQ)utica:10948
035
$a
AAI10278019
040
$a
MiAaPQ
$b
eng
$c
MiAaPQ
100
1
$a
Adeniyi, Hammed.
$3
1185399
245
1 0
$a
Game Theory Principals for Decision-Making in Cybersecurity.
264
0
$c
2017
300
$a
1 online resource (44 pages)
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
500
$a
Source: Masters Abstracts International, Volume: 56-04.
500
$a
Adviser: Jaclyn Giordano.
502
$a
Thesis (M.S.)--Utica College, 2017.
504
$a
Includes bibliographical references
520
$a
Complexities of network intrusion behaviors require a scientific approach where a decision can be quickly quantified, adapted, and applied to attributes of attackers and defenders of systems. Quantitative methods such as Game Theory provide a way to analyze issues, behaviors, and interactions amongst attackers and defenders of the network. Analysts need detailed analysis models that provide deep understanding, prioritization of cyber activities, evaluation of security vulnerabilities/threats/risks, and ability to predict behaviors. Once the behaviors are determined, then an automated action is enacted to countermeasure network intrusion/disruption. As the process is automated and looped back, a learned behavior model is created. This learned behavior becomes the basis for a continuous self-improving decision making network security system.Many factors lead to organizational decision making policies for network security. These factors stem from a root complexity of limited resource allocation and organization's ability to prioritize the range, scale, and profile of unknown attack attributes. Decision roadblocks are greater amongst entities with insufficient resources, which are used to manage threats and activities to reduce network vulnerabilities. As for results, many network security platforms lack the decision capabilities to match adversaries changing behavioral patterns. This research will be used to analyze the application of game theory methods on cybersecurity decision making.
533
$a
Electronic reproduction.
$b
Ann Arbor, Mich. :
$c
ProQuest,
$d
2018
538
$a
Mode of access: World Wide Web
650
4
$a
Information science.
$3
561178
650
4
$a
Information technology.
$3
559429
655
7
$a
Electronic books.
$2
local
$3
554714
690
$a
0723
690
$a
0489
710
2
$a
ProQuest Information and Learning Co.
$3
1178819
710
2
$a
Utica College.
$b
Cybersecurity.
$3
1148527
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=10278019
$z
click for full text (PQDT)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入