skip to main content
OSTI.GOV title logo U.S. Department of Energy
Office of Scientific and Technical Information

Title: Game Theory and Uncertainty Quantification for Cyber Defense Applications

Abstract

Cyber-system defenders face the challenging task of protecting critical assets and information continually against multiple types of malicious attackers. Defenders typically operate within resource constraints while attackers operate at relatively low costs. As a result, design and development of resilient cyber-systems that can support mission goals under attack while accounting for the dynamics between attackers and defenders is an important research problem.

Authors:
; ; ;
Publication Date:
Research Org.:
Pacific Northwest National Lab. (PNNL), Richland, WA (United States)
Sponsoring Org.:
USDOE
OSTI Identifier:
1342299
Report Number(s):
PNNL-SA-119091
DOE Contract Number:  
AC05-76RL01830
Resource Type:
Journal Article
Resource Relation:
Journal Name: SIAM News, 49(6):1-5
Country of Publication:
United States
Language:
English
Subject:
cyber security; uncertainty

Citation Formats

Chatterjee, Samrat, Halappanavar, Mahantesh, Tipireddy, Ramakrishna, and Oster, Matthew R. Game Theory and Uncertainty Quantification for Cyber Defense Applications. United States: N. p., 2016. Web.
Chatterjee, Samrat, Halappanavar, Mahantesh, Tipireddy, Ramakrishna, & Oster, Matthew R. Game Theory and Uncertainty Quantification for Cyber Defense Applications. United States.
Chatterjee, Samrat, Halappanavar, Mahantesh, Tipireddy, Ramakrishna, and Oster, Matthew R. Thu . "Game Theory and Uncertainty Quantification for Cyber Defense Applications". United States. doi:.
@article{osti_1342299,
title = {Game Theory and Uncertainty Quantification for Cyber Defense Applications},
author = {Chatterjee, Samrat and Halappanavar, Mahantesh and Tipireddy, Ramakrishna and Oster, Matthew R.},
abstractNote = {Cyber-system defenders face the challenging task of protecting critical assets and information continually against multiple types of malicious attackers. Defenders typically operate within resource constraints while attackers operate at relatively low costs. As a result, design and development of resilient cyber-systems that can support mission goals under attack while accounting for the dynamics between attackers and defenders is an important research problem.},
doi = {},
journal = {SIAM News, 49(6):1-5},
number = ,
volume = ,
place = {United States},
year = {Thu Jul 21 00:00:00 EDT 2016},
month = {Thu Jul 21 00:00:00 EDT 2016}
}