Abstract
Classical mathematical game theory helps to evolve the emerging logic of identity in the cyber world.
- Argiento R., Pemantle, R., Skyrms, B. and Volkov, S. Learning to signal: Analysis of a micro-level reinforcement model. Stochastic Processes and their Applications 119, 2 (2009), 373--390.Google Scholar
- Axelrod, R. An evolutionary approach to norms. American Political Science Review 80, 4 (1986), 1095--1111.Google ScholarCross Ref
- Axelrod, R. The Evolution of Cooperation. Basic books, 2006.Google Scholar
- Banks, J. and Sobel, J. Equilibrium selection in signaling games. Econometrica: J. EconometricSociety, (1987), 647--661.Google Scholar
- Binmore, K. and Samuelson, L. Evolutionary stability in repeated games played by finite automata. J. Economic Theory 57, 2 (1992), 278--305.Google ScholarCross Ref
- Casey, W., Memarmoshrefi, P., Kellner, A., Morales, J.A. and Mishra, B. Identity deception and game deterrence via signaling games. In Proceedings of the 9<sup>th</sup> EAI Intern. Conf. Bio-inspired Information and Communications Technologies, 73--82. Google ScholarDigital Library
- Casey, W., Morales, J.A. and Mishra, B. Threats from inside: Dynamic utility (mis) alignments in an agent-based model. J. Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications 7 (2016), 97--117.Google Scholar
- Casey, W., Morales, J.A., Nguyen, T., Spring, J., Weaver R., Wright, E., Metcalf, L. and Mishra, B. Cyber security via signaling games: Toward a science of cyber security. In Proceedings of the Intern. Conf. Distributed Computing and Internet Technology, 34--42. Google ScholarDigital Library
- Casey, W., Morales, J.A., Wright, E., Zhu, Q. and Mishra, B. Compliance signaling games: Toward modeling the deterrence of insider threats. Computational and Mathematical Organization Theory 22, 3 (2016), 318--349. Google ScholarDigital Library
- Casey, W., Weaver, R., Morales, J.A., Wright, E. and Mishra, B. Epistatic signaling and minority games, the adversarial dynamics in social technological systems. Mobile Networks and Applications 21, 1 (2016), 161--174. Google ScholarDigital Library
- Casey, W., Wright, E., Morales, J.A., Appel, M., Gennari, J. and Mishra, B. Agent-based trace learning in a recommendation verification system for cybersecurity. In Proceedings of the 9<sup>th</sup> IEEE Intern. Conf. on Malicious and Unwanted Software: The Americas, (2014), 135--143.Google ScholarCross Ref
- Casey, W., Zhu, Q., Morales, J.A. and Mishra, B. Compliance control: Managed vulnerability surface in social-technological systems via signaling games. In Proceedings of the 7<sup>th</sup> ACM CCS Intern. Workshop on Managing Insider Security Threats, (2015), 53--62. Google ScholarDigital Library
- Catteeuw, D., Manderick, B. et al. Evolution of honest signaling by social punishment. In Proceedings of the 2014 Annual Conf. Genetic and Evolutionary Computation, (2014), 153--160. Google ScholarDigital Library
- Cho, I-K. and Sobel, J. Strategic stability and uniqueness in signaling games. J. Economic Theory 50, 2 (1990), 381--413.Google ScholarCross Ref
- Chung, H. and Carroll, S.B. Wax, sex and the origin of species: Dual roles of insect cuticular hydrocarbons in adaptation and mating. BioEssays, (2015).Google ScholarCross Ref
- Daskalakis, C., Goldberg, P.W. and Papadimitriou, C.H. The complexity of computing a Nash equilibrium. SIAM J. Computing 39, 1 (2009), 195--259. Google ScholarDigital Library
- Fabrikant, A., Papadimitriou, C. and Talwar, K. The complexity of pure Nash equilibria. In Proceedings of the 36<sup>th</sup> Annual ACM Symposium on Theory of Computing, (2004), 604--612. Google ScholarDigital Library
- Hamblin, S. and Hurd, P.L. When will evolution lead to deceptive signaling in the Sir Philip Sidney game? Theoretical Population Biology 75, 2 (2009), 176--182.Google ScholarCross Ref
- Huttegger, S.M., Skyrms, B., Smead, R. and and Zollman, K.J.S. Evolutionary dynamics of Lewis signaling games: Signaling systems vs. partial pooling. Synthese 172, 1 (2010), 177--191.Google ScholarCross Ref
- Jee, J., Sundstrom, A., Massey, S.E. and Mishra, B. What can information-asymmetric games tell us about the context of Crick's 'frozen accident'? J. the Royal Society Interface 10, 88 (2013).Google ScholarCross Ref
- King, D. The Haiti earthquake: Breaking new ground in the humanitarian information landscape. Humanitarian Exchange Magazine 48, (2010).Google Scholar
- Lewis, D. Convention: A Philosophical Study. John Wiley & Sons, 2008.Google Scholar
- Nash, J. Non-cooperative games. Annals of Mathematics, (1951), 286--295.Google ScholarCross Ref
- Nash, J. et al. Equilibrium points in n-person games. In Proceedings of the National Academy of Sciences 36, 1 (1950), 48--49.Google ScholarCross Ref
- Nash, J.F. Jr. The bargaining problem. Econometrica: J. Econometric Society, (1950), 155--162.Google ScholarCross Ref
- Newsome, J., Shi, E., Song, D. and Perrig, A. The Sybil attack in sensor networks: Analysis & defenses. In Proceedings of the 3<sup>rd</sup> International Symposium on Information Processing in Sensor Networks, (2004), 259--268. Google ScholarDigital Library
- Papadimitriou, C. Algorithms, Games, and the Internet. In Proceedings of the 33<sup>rd</sup> Annual ACM Symposium on Theory of Computing, (2001), 749--753. Google ScholarDigital Library
- Sharma, K.R., Enzmann, B.L. et al. Cuticular Hydrocarbon pheromones for social behavior and their coding in the ant antenna. Cell Reports 12, 8 (2015), 1261--1271.Google ScholarCross Ref
- Silk, J.B., Kaldor, E., and Boyd, R. Cheap talk when interests conflict. Animal Behavior 59, 2 (2000), 423--432.Google ScholarCross Ref
- Skyrms, B. The Stag Hunt and the Evolution of Social Structure. Cambridge University Press, 2004.Google Scholar
- Skyrms, B. Signals: Evolution, Learning, and Information. Oxford University Press, 2010.Google Scholar
- Smith, J.M. Evolution and the Theory of Games. Cambridge University Press, 1982.Google ScholarCross Ref
- Smith, J.M. Honest signaling: The Philip Sidney game. Animal Behaviour 42, 6 (1991), 1034--1035.Google ScholarCross Ref
- Sobel, M.J. et al. Non-cooperative stochastic games. The Annals of Mathematical Statistics 42, 6 (1971), 1930--1935.Google ScholarCross Ref
- Neumann, J.V. and Morgenstern, O. Theory of Games and Economic Behavior. Princeton University Press, 2007.Google Scholar
- Zollman, K.J.S., Bergstrom, C.T., and Huttegger, S.M. Between cheap and costly signals: The evolution of partially honest communication. In Proceedings of the Royal Society of London B: Biological Sciences, (2012).Google ScholarCross Ref
Recommendations
A Game-theoretic Taxonomy and Survey of Defensive Deception for Cybersecurity and Privacy
Cyberattacks on both databases and critical infrastructure have threatened public and private sectors. Ubiquitous tracking and wearable computing have infringed upon privacy. Advocates and engineers have recently proposed using defensive deception as a ...
Game theory meets network security and privacy
This survey provides a structured and comprehensive overview of research on security and privacy in computer and communication networks that use game-theoretic approaches. We present a selected set of works to highlight the application of game theory in ...
Game theory for adaptive defensive cyber deception
HotSoS '19: Proceedings of the 6th Annual Symposium on Hot Topics in the Science of SecurityAs infamous hacker Kevin Mitnick describes in his book The Art of Deception, "the human factor is truly security's weakest link" [18]. Deception has been widely successful when used by hackers for social engineering and by military strategists in ...
Comments