Showing 1 - 10 of 81,024
Persistent link: https://www.econbiz.de/10012108741
We build an analytical framework to model the strategic interactions between a firm and hackers. Firms invest in security to defend against cyber attacks by hackers. Hackers choose an optimal attack, and they share information with each other about the firm's vulnerabilities. Each hacker prefers...
Persistent link: https://www.econbiz.de/10014026808
M.M.Keupp: Introduction and Overview -- Speed: S. Gillard, T. Maillart, M.M.Keupp: Reducing Time to Response in Cyber Defense: An Agent-based Model -- K Su, Ch Ahmed, J. Zhou: Unsupervised Attack Isolation in Cyber-physical Systems: A Competitive Test of Clustering Algorithms -- P. Fischer, S....
Persistent link: https://www.econbiz.de/10014369217
A four period game between two firms and two hackers is analyzed. The firms first defend and the hackers thereafter attack and share information. Each hacker seeks financial gain, beneficial information exchange, and reputation gain. The two hackers’ attacks and the firms’ defenses are...
Persistent link: https://www.econbiz.de/10011708862
Persistent link: https://www.econbiz.de/10012260071
Persistent link: https://www.econbiz.de/10014546354
Persistent link: https://www.econbiz.de/10011707157
Persistent link: https://www.econbiz.de/10011754562
Persistent link: https://www.econbiz.de/10014434690
Persistent link: https://www.econbiz.de/10012170335