Abstract
This paper uses game theory to model the strategies against the threats based on the cost.If the frequencies of threats occurrence are known, the optimal pure strategy can be found by expected effectiveness. However, if those frequencies are unknown, the optimal strategy is a mixed strategy provided by game theory. The problem can also be solved by linear programming method.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Mendelson, E.: Introducing Game Theory and Its Applications. Chapman & Hall/CRC Press Co, New York (2004)
Bishop, M.: Computer Security. Addison-Wesley/Prentice-Hall, Boston (2003)
Whitman, M., Mattord, H.: Management of Information Security. Thomson Course Technology, New York (2004)
Thomas, L.: Games. Theory and Applications. John Wiley & Sons, New York (1984)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Shing, ML., Shing, CC. (2011). A Security Risk Model Using Game Theory. In: Tan, H. (eds) Informatics in Control, Automation and Robotics. Lecture Notes in Electrical Engineering, vol 132. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-25899-2_15
Download citation
DOI: https://doi.org/10.1007/978-3-642-25899-2_15
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-25898-5
Online ISBN: 978-3-642-25899-2
eBook Packages: EngineeringEngineering (R0)