A comprehensive insight into game theory in relevance to cyber security
The progressively ubiquitous connectivity in the present information systems pose newer challenges tosecurity. The conventional security mechanisms have come a long way in securing the well-definedobjectives of confidentiality, integrity, authenticity and availability. Nevertheless, with the growth...
| Main Authors: | Anwar, Farhat, Khan, Burhan Ul Islam, Olanrewaju, Rashidah Funke, Pampori, Bisma Rasool, Mir, Roohie Naaz |
|---|---|
| Format: | Article |
| Language: | English English |
| Published: |
Institute of Advanced Engineering and Science (IAES) Indonesia Section in collaboration with Universitas Ahmad Dahlan and Universitas Diponegoro
2020
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/80084/ http://irep.iium.edu.my/80084/2/80084%20A%20comprehensive%20insight%20into%20game%20theory.pdf http://irep.iium.edu.my/80084/3/80084%20A%20comprehensive%20insight%20into%20game%20theory%20SCOPUS.pdf |
Similar Items
Bayesian signaling game based efficient security model for MANETs
by: Olanrewaju, Rashidah Funke, et al.
Published: (2020)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2020)
Behaviour visualization for malicious-attacker node collusion in MANET based on probabilistic approach
by: Olanrewaju, Rashidah Funke, et al.
Published: (2015)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2015)
ECM-GT: design of efficient computational modelling based on game theoretical approach towards enhancing the security solutions in MANET
by: Khan, Burhan Ul Islam, et al.
Published: (2019)
by: Khan, Burhan Ul Islam, et al.
Published: (2019)
Trust and resource oriented communication scheme in mobile ad hoc networks
by: Khan, Burhan Ul Islam, et al.
Published: (2018)
by: Khan, Burhan Ul Islam, et al.
Published: (2018)
Game theoretic approach for exhaustive tactical modelling of node misbehavior in adhoc networking based IOT paradigm/P-RIGS18-020-0020
by: Olanrewaju, Rashidah Funke Olanrewaju, et al.
Published: (2019)
by: Olanrewaju, Rashidah Funke Olanrewaju, et al.
Published: (2019)
Critical insight for MAPReduce optimization in Hadoop
by: Khan, Burhan ul Islam, et al.
Published: (2014)
by: Khan, Burhan ul Islam, et al.
Published: (2014)
A novel multi-agent and multilayered game formulation for Intrusion Detection in Internet of Things (IoT)
by: Khan, Burhan Ul Islam, et al.
Published: (2020)
by: Khan, Burhan Ul Islam, et al.
Published: (2020)
Scrutinising internet banking security solutions
by: Khan, Burhan ul Islam, et al.
Published: (2020)
by: Khan, Burhan ul Islam, et al.
Published: (2020)
A game theory-based strategic approach to ensure reliable data transmission with optimized network operations in futuristic Mobile Adhoc Networks
by: Khan, Burhan ul Islam, et al.
Published: (2020)
by: Khan, Burhan ul Islam, et al.
Published: (2020)
MANET security appraisal: Challenges, essentials, attacks, countermeasures & future directions
by: Olanrewaju, Rashidah Funke, et al.
Published: (2020)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2020)
Offline OTP based solution for secure internet banking access
by: Khan, Burhan ul Islam, et al.
Published: (2019)
by: Khan, Burhan ul Islam, et al.
Published: (2019)
Manifestation and mitigation of node misbehaviour in adhoc networks
by: Khan, Burhan ul Islam, et al.
Published: (2014)
by: Khan, Burhan ul Islam, et al.
Published: (2014)
EloPSO: energy aware elephant swarm optimization for mobile adhoc networks
by: Khan , Burhan ul Islam, et al.
Published: (2014)
by: Khan , Burhan ul Islam, et al.
Published: (2014)
Efficient cache replacement policy for minimising error rate in L2-STT-MRAM caches
by: Olanrewaju, Rashidah Funke, et al.
Published: (2018)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2018)
r-TOLA: an architecture for real time open learning application for universities
by: Olanrewaju, Rashidah Funke, et al.
Published: (2014)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2014)
A comprehensive survey on pi-sigma neural network for time series prediction
by: Akram, Urooj, et al.
Published: (2017)
by: Akram, Urooj, et al.
Published: (2017)
STRATEGIC PROFILING & ANALYTIC MODELLING OF NODE MISBEHAVIOR IN MANET BASED IOT PARADIGM THEORY
by: Olanrewaju, Rashidah Funke, et al.
Published: (2018)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2018)
A critical insight into the effectiveness of research
methods evolved to secure IoT ecosystem
by: Khan, Burhan ul Islam, et al.
Published: (2018)
by: Khan, Burhan ul Islam, et al.
Published: (2018)
MotionSure: a cloud-based algorithm for detection of injected object in data in motion
by: Islam, Thouhedul, et al.
Published: (2017)
by: Islam, Thouhedul, et al.
Published: (2017)
MANET – A cogitation of its design and security issues
by: Olanrewaju, Rashidah Funke, et al.
Published: (2016)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2016)
Cyber risk management for wireless communication in organization
by: Mutakin, Darul, et al.
Published: (2016)
by: Mutakin, Darul, et al.
Published: (2016)
MARKCLOUD - Software for data confidentiality and security in cloud computing environments
by: Olanrewaju, Rashidah Funke, et al.
Published: (2014)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2014)
Internet of things security vulnerabilities and recommended solutions
by: Olanrewaju, Rashidah Funke, et al.
Published: (2018)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2018)
A secure authentication scheme for bluetooth connection
by: Diallo, Alhassane Saliou, et al.
Published: (2014)
by: Diallo, Alhassane Saliou, et al.
Published: (2014)
ICT in telemedicine: conquering privacy and security issues in health care services
by: Olanrewaju, Rashidah Funke, et al.
Published: (2012)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2012)
On a generalized self-similarity in the p-Adic field
by: Mukhamedov, Farrukh M., et al.
Published: (2016)
by: Mukhamedov, Farrukh M., et al.
Published: (2016)
Paramagnetic phases of four-state Potts model on a Cayley tree in the presence of competing interactions
by: Ganikhodjaev, Nasir, et al.
Published: (2019)
by: Ganikhodjaev, Nasir, et al.
Published: (2019)
Rock-paper-scissors lattice model
by: Ganikhodjaev, Nasir
Published: (2019)
by: Ganikhodjaev, Nasir
Published: (2019)
A novel neuroscience-inspired architecture: for computer vision applications
by: Hassan, Marwa Yousif, et al.
Published: (2016)
by: Hassan, Marwa Yousif, et al.
Published: (2016)
Determining watermark embedding strength using complex valued neural network
by: Olanrewaju, Rashidah Funke, et al.
Published: (2011)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2011)
Key individual identification using dimensional relevance in the stratum of networks
by: Shah, Asadullah, et al.
Published: (2019)
by: Shah, Asadullah, et al.
Published: (2019)
Modelling of intelligent intrusion detection system: making a case for snort
by: Olanrewaju, Rashidah Funke, et al.
Published: (2018)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2018)
IUK 106E - STATISTICS FOR TECHNOLOGIST JUNE 06.
by: PPTI, Pusat Pengajian Teknologi Industri
Published: (2006)
by: PPTI, Pusat Pengajian Teknologi Industri
Published: (2006)
IUK 106E - STATISTIK UNTUK TEKNOLOGIS SEPT 03.
by: PPTI, Pusat Pengajian Teknologi Industri
Published: (2003)
by: PPTI, Pusat Pengajian Teknologi Industri
Published: (2003)
IUK 106E - STATISTICS FOR TECHNOLOGIST NOV.05.
by: PPTI, Pusat Pengajian Teknologi Industri
Published: (2005)
by: PPTI, Pusat Pengajian Teknologi Industri
Published: (2005)
EEE 503 - STOCHASTIC PROCESS MARCH 05.
by: PPKEE, Pusat Pengajian Kejuruteraan Elektrik & Elektronik
Published: (2005)
by: PPKEE, Pusat Pengajian Kejuruteraan Elektrik & Elektronik
Published: (2005)
EEE 551 - INTELLIGENT SYSTEMS MARCH 05.
by: PPKEE, Pusat Pengajian Kejuruteraan Elektrik & Elektronik
Published: (2005)
by: PPKEE, Pusat Pengajian Kejuruteraan Elektrik & Elektronik
Published: (2005)
EEM 348 - PRINSIP SISTEM PINTAR MAC 05.
by: PPKEE, Pusat Pengajian Kejuruteraan Elektrik & Elektronik
Published: (2005)
by: PPKEE, Pusat Pengajian Kejuruteraan Elektrik & Elektronik
Published: (2005)
JIM416-420 - REKA BENTUK & ANALISIS UJIKAJI MAC 05.
by: PPJJ, Pusat Pengajian Jarak Jauh
Published: (2005)
by: PPJJ, Pusat Pengajian Jarak Jauh
Published: (2005)
JIM 312 -TEORI KEBARANGKALIAN MAC 05.
by: PPJJ, Pusat Pengajian Jarak Jauh
Published: (2005)
by: PPJJ, Pusat Pengajian Jarak Jauh
Published: (2005)
Similar Items
-
Bayesian signaling game based efficient security model for MANETs
by: Olanrewaju, Rashidah Funke, et al.
Published: (2020) -
Behaviour visualization for malicious-attacker node collusion in MANET based on probabilistic approach
by: Olanrewaju, Rashidah Funke, et al.
Published: (2015) -
ECM-GT: design of efficient computational modelling based on game theoretical approach towards enhancing the security solutions in MANET
by: Khan, Burhan Ul Islam, et al.
Published: (2019) -
Trust and resource oriented communication scheme in mobile ad hoc networks
by: Khan, Burhan Ul Islam, et al.
Published: (2018) -
Game theoretic approach for exhaustive tactical modelling of node misbehavior in adhoc networking based IOT paradigm/P-RIGS18-020-0020
by: Olanrewaju, Rashidah Funke Olanrewaju, et al.
Published: (2019)