Game-theoretic analysis of hacker and firm information security strategies under risk preferences and budget constraints

Yong WU, Yujie JIANG, Gengzhong FENG, Dong YANG

Systems Engineering - Theory & Practice ›› 2025, Vol. 45 ›› Issue (12) : 4049-4063.

PDF(1014 KB)
PDF(1014 KB)
Systems Engineering - Theory & Practice ›› 2025, Vol. 45 ›› Issue (12) : 4049-4063. DOI: 10.12011/SETP2024-1745

Game-theoretic analysis of hacker and firm information security strategies under risk preferences and budget constraints

  • Yong WU1(), Yujie JIANG1(), Gengzhong FENG2,*(), Dong YANG1()
Author information +
History +

HeighLight

{{article.keyPoints_en}}

Abstract

{{article.zhaiyao_en}}

Key words

QR code of this article

Cite this article

Download Citations
{{article.zuoZheEn_L}}. {{article.title_en}}. Systems Engineering - Theory & Practice, 2025, 45(12): 4049-4063 https://doi.org/10.12011/SETP2024-1745

References

References

{{article.reference}}

Funding

RIGHTS & PERMISSIONS

{{article.copyrightStatement_en}}
{{article.copyrightLicense_en}}
PDF(1014 KB)

Accesses

Citation

Detail

Sections
Recommended

/