Item request has been placed!
×
Item request cannot be made.
×
Processing Request
The Method of Information Security System Design Using Deterministic Game "Defender-Attacker". (English)
Item request has been placed!
×
Item request cannot be made.
×
Processing Request
- Additional Information
- Abstract:
This study describes the approach to solving the problem of creating a system of information protection with limited resources. The problem is solved using the game theory, notably a formal apparatus which allows taking into account the conflict relationships between an attacker and a defender. In terms of the game theory, the attacker's reward is the damage inflicted on the victim, while the defender aims to minimize the risk and ensure the stable system operation. Solving the described problem, we obtain the optimal set of security measures that provides the maximum level of protection under the given constraints. [ABSTRACT FROM AUTHOR]
- Abstract:
Copyright of Naukovi visti NTUU - KPI is the property of National Technical University of Ukraine KPI and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
No Comments.