TY - CHAP
T1 - Review of Game Theory
AU - Zhu, Quanyan
AU - Xu, Zhiheng
N1 - Publisher Copyright:
© 2020, The Author(s), under exclusive license to Springer Nature Switzerland AG.
PY - 2020
Y1 - 2020
N2 - Theoretic models, such as game-theoretic model, Markov decision processes, linear and non-linear dynamic models, etc., at the system level, play a significant role in Cyber-Physical Systems (CPSs). These models stand as a scientific basis for high-level, security-related decision making. Game theory provides mathematical tools and models for investigating multi-person strategic decision making, where the players or decision-makers compete for limited and shared resources (Manshaei et al., ACM Comput Surv 45(3):25, 2013). Considering the security issues in CPSs, we can view the defenders and attackers as two types of players, who fight for specific resources. Therefore, we use game models to describe the interactions between them. The analytical results based on the game models can assist us in finding the optimal defense strategy. In this chapter, we briefly review specific game theory models, including zero-sum games, Stackelberg games, and FlipIt game. These models are closely related to our applications.
AB - Theoretic models, such as game-theoretic model, Markov decision processes, linear and non-linear dynamic models, etc., at the system level, play a significant role in Cyber-Physical Systems (CPSs). These models stand as a scientific basis for high-level, security-related decision making. Game theory provides mathematical tools and models for investigating multi-person strategic decision making, where the players or decision-makers compete for limited and shared resources (Manshaei et al., ACM Comput Surv 45(3):25, 2013). Considering the security issues in CPSs, we can view the defenders and attackers as two types of players, who fight for specific resources. Therefore, we use game models to describe the interactions between them. The analytical results based on the game models can assist us in finding the optimal defense strategy. In this chapter, we briefly review specific game theory models, including zero-sum games, Stackelberg games, and FlipIt game. These models are closely related to our applications.
UR - http://www.scopus.com/inward/record.url?scp=85096388320&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85096388320&partnerID=8YFLogxK
U2 - 10.1007/978-3-030-60251-2_6
DO - 10.1007/978-3-030-60251-2_6
M3 - Chapter
AN - SCOPUS:85096388320
T3 - Advances in Information Security
SP - 61
EP - 70
BT - Advances in Information Security
PB - Springer
ER -