Cybersecurity

A Survey of Interdependent Information Security Games

Risks faced by information system operators and users are not only determined by their own security posture, but are also heavily affected by the security-related decisions of others. This interdependence between information system operators and …

The Complexity of Estimating Systematic Risk in Networks

How Many Down? Toward Understanding Systematic Risk in Networks

Estimating Systematic Risk in Real-World Networks

Game-Theoretic Analysis of DDoS Attacks Against Bitcoin Mining Pools

Mitigating Covert Compromises: A Game-Theoretic Model of Targeted and Non-Targeted Covert Attacks

Modeling Content-Adaptive Steganography with Detection Costs as a Quasi-Zero-Sum Game

Recently, content-adaptive steganography was modeled by Johnson et al. as a stochastic, two-player, zero-sum game between a steganographer and a steganalyst. To model economically rational steganalysts, we generalize this model by introducing a …

Mitigation of Targeted and Non-Targeted Covert Attacks as a Timing Game

Quantifying Network Topology Robustness Under Budget Constraints: General Model and Computational Complexity

Bitspotting: Detecting Optimal Adaptive Steganography