Loading…
Game-theoretic computing in risk analysis
Risk analysis, comprising risk assessment and risk management stages, is one of the most popular and challenging topics of our times because security and privacy, and availability and usability culminating at the trustworthiness of cybersystems and cyber information is at stake. The precautionary ne...
Saved in:
Published in: | Wiley interdisciplinary reviews. Computational statistics 2012-05, Vol.4 (3), p.227-248 |
---|---|
Main Authors: | , , |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that this one cites Items that cite this one |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | cdi_FETCH-LOGICAL-c3355-558d84dadcb9d51180cd6176348261311622afea4ee9a63f92d1649728ddfdd13 |
---|---|
cites | cdi_FETCH-LOGICAL-c3355-558d84dadcb9d51180cd6176348261311622afea4ee9a63f92d1649728ddfdd13 |
container_end_page | 248 |
container_issue | 3 |
container_start_page | 227 |
container_title | Wiley interdisciplinary reviews. Computational statistics |
container_volume | 4 |
creator | Sahinoglu, Mehmet Cueva-Parra, Luis Ang, David |
description | Risk analysis, comprising risk assessment and risk management stages, is one of the most popular and challenging topics of our times because security and privacy, and availability and usability culminating at the trustworthiness of cybersystems and cyber information is at stake. The precautionary need derives from the existence of defenders versus adversaries, in an everlasting Darwinian scenario dating back to early human history of warriors fighting for their sustenance to survive. Fast forwarding to today's information warfare, whether in networks or healthcare or national security, the currently dire situation necessitates more than a hand calculator to optimize (maximize gains or minimize losses) risk due to prevailing scarce economic resources. This article reviews the previous works completed on this specialized topic of game‐theoretic computing, its methods and applications toward the purpose of quantitative risk assessment and cost‐optimal management in many diverse disciplines including entire range of informatics‐related topics. Additionally, this review considers certain game‐theoretic topics in depth historically, and those computationally resourceful such as Neumann's two‐way zero‐sum pure equilibrium and optimal mixed strategy solutions versus Nash equilibria with pure and mixed strategies. Computational examples are provided to highlight the significance of game‐theoretic solutions used in risk assessment and management, particularly in reference to cybersystems and information security. WIREs Comput Stat 2012, 4:227–248. doi: 10.1002/wics.1205
This article is categorized under:
Algorithms and Computational Methods > Linear Programming
Algorithms and Computational Methods > Networks and Security |
doi_str_mv | 10.1002/wics.1205 |
format | article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_1971717801</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>1971717801</sourcerecordid><originalsourceid>FETCH-LOGICAL-c3355-558d84dadcb9d51180cd6176348261311622afea4ee9a63f92d1649728ddfdd13</originalsourceid><addsrcrecordid>eNp1kEtPwzAQhC0EEqVw4B9E4tRDWq8dO_aRVvSlAgdAHC1jO-C-UuxUpf-eRKm4oTnsavXNajQI3QLuA8ZkcPAm9oFgdoY6IKlMMebi_LQzwOISXcW4rK95rQ7qTfTGpdWXK4OrvElMudntK7_9TPw2CT6uEr3V62P08RpdFHod3c1pdtHb-OF1NE0Xz5PZ6H6RGkoZSxkTVmRWW_MhLQMQ2FgOOaeZIBwoACdEF05nzknNaSGJBZ7JnAhrC2uBdtFd-3cXyu-9i5ValvtQh4gKZA61BG6oXkuZUMYYXKF2wW90OCrAqmlCNU2opomaHbTswa_d8X9Qvc9GLydH2jp8rNzPn0OHleI5zWvyaaLI9JHAcDhXc_oLVn1thQ</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1971717801</pqid></control><display><type>article</type><title>Game-theoretic computing in risk analysis</title><source>Wiley</source><creator>Sahinoglu, Mehmet ; Cueva-Parra, Luis ; Ang, David</creator><creatorcontrib>Sahinoglu, Mehmet ; Cueva-Parra, Luis ; Ang, David</creatorcontrib><description>Risk analysis, comprising risk assessment and risk management stages, is one of the most popular and challenging topics of our times because security and privacy, and availability and usability culminating at the trustworthiness of cybersystems and cyber information is at stake. The precautionary need derives from the existence of defenders versus adversaries, in an everlasting Darwinian scenario dating back to early human history of warriors fighting for their sustenance to survive. Fast forwarding to today's information warfare, whether in networks or healthcare or national security, the currently dire situation necessitates more than a hand calculator to optimize (maximize gains or minimize losses) risk due to prevailing scarce economic resources. This article reviews the previous works completed on this specialized topic of game‐theoretic computing, its methods and applications toward the purpose of quantitative risk assessment and cost‐optimal management in many diverse disciplines including entire range of informatics‐related topics. Additionally, this review considers certain game‐theoretic topics in depth historically, and those computationally resourceful such as Neumann's two‐way zero‐sum pure equilibrium and optimal mixed strategy solutions versus Nash equilibria with pure and mixed strategies. Computational examples are provided to highlight the significance of game‐theoretic solutions used in risk assessment and management, particularly in reference to cybersystems and information security. WIREs Comput Stat 2012, 4:227–248. doi: 10.1002/wics.1205
This article is categorized under:
Algorithms and Computational Methods > Linear Programming
Algorithms and Computational Methods > Networks and Security</description><identifier>ISSN: 1939-5108</identifier><identifier>EISSN: 1939-0068</identifier><identifier>DOI: 10.1002/wics.1205</identifier><language>eng</language><publisher>Hoboken, USA: John Wiley & Sons, Inc</publisher><subject>Algorithms ; Calculators ; Computation ; Computer applications ; Cybersecurity ; Dating techniques ; Economic resources ; Game theory ; game-theoretic ; Health care ; Historical account ; Informatics ; Information warfare ; Linear programming ; Methods ; mixed strategy ; Nash equilibrium ; Optimization ; Risk analysis ; Risk assessment ; Risk management ; Security ; Solutions ; Trustworthiness</subject><ispartof>Wiley interdisciplinary reviews. Computational statistics, 2012-05, Vol.4 (3), p.227-248</ispartof><rights>Copyright © 2012 Wiley Periodicals, Inc.</rights><rights>Copyright Wiley Subscription Services, Inc. May/Jun 2012</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c3355-558d84dadcb9d51180cd6176348261311622afea4ee9a63f92d1649728ddfdd13</citedby><cites>FETCH-LOGICAL-c3355-558d84dadcb9d51180cd6176348261311622afea4ee9a63f92d1649728ddfdd13</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,27924,27925</link.rule.ids></links><search><creatorcontrib>Sahinoglu, Mehmet</creatorcontrib><creatorcontrib>Cueva-Parra, Luis</creatorcontrib><creatorcontrib>Ang, David</creatorcontrib><title>Game-theoretic computing in risk analysis</title><title>Wiley interdisciplinary reviews. Computational statistics</title><addtitle>WIREs Comp Stat</addtitle><description>Risk analysis, comprising risk assessment and risk management stages, is one of the most popular and challenging topics of our times because security and privacy, and availability and usability culminating at the trustworthiness of cybersystems and cyber information is at stake. The precautionary need derives from the existence of defenders versus adversaries, in an everlasting Darwinian scenario dating back to early human history of warriors fighting for their sustenance to survive. Fast forwarding to today's information warfare, whether in networks or healthcare or national security, the currently dire situation necessitates more than a hand calculator to optimize (maximize gains or minimize losses) risk due to prevailing scarce economic resources. This article reviews the previous works completed on this specialized topic of game‐theoretic computing, its methods and applications toward the purpose of quantitative risk assessment and cost‐optimal management in many diverse disciplines including entire range of informatics‐related topics. Additionally, this review considers certain game‐theoretic topics in depth historically, and those computationally resourceful such as Neumann's two‐way zero‐sum pure equilibrium and optimal mixed strategy solutions versus Nash equilibria with pure and mixed strategies. Computational examples are provided to highlight the significance of game‐theoretic solutions used in risk assessment and management, particularly in reference to cybersystems and information security. WIREs Comput Stat 2012, 4:227–248. doi: 10.1002/wics.1205
This article is categorized under:
Algorithms and Computational Methods > Linear Programming
Algorithms and Computational Methods > Networks and Security</description><subject>Algorithms</subject><subject>Calculators</subject><subject>Computation</subject><subject>Computer applications</subject><subject>Cybersecurity</subject><subject>Dating techniques</subject><subject>Economic resources</subject><subject>Game theory</subject><subject>game-theoretic</subject><subject>Health care</subject><subject>Historical account</subject><subject>Informatics</subject><subject>Information warfare</subject><subject>Linear programming</subject><subject>Methods</subject><subject>mixed strategy</subject><subject>Nash equilibrium</subject><subject>Optimization</subject><subject>Risk analysis</subject><subject>Risk assessment</subject><subject>Risk management</subject><subject>Security</subject><subject>Solutions</subject><subject>Trustworthiness</subject><issn>1939-5108</issn><issn>1939-0068</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2012</creationdate><recordtype>article</recordtype><recordid>eNp1kEtPwzAQhC0EEqVw4B9E4tRDWq8dO_aRVvSlAgdAHC1jO-C-UuxUpf-eRKm4oTnsavXNajQI3QLuA8ZkcPAm9oFgdoY6IKlMMebi_LQzwOISXcW4rK95rQ7qTfTGpdWXK4OrvElMudntK7_9TPw2CT6uEr3V62P08RpdFHod3c1pdtHb-OF1NE0Xz5PZ6H6RGkoZSxkTVmRWW_MhLQMQ2FgOOaeZIBwoACdEF05nzknNaSGJBZ7JnAhrC2uBdtFd-3cXyu-9i5ValvtQh4gKZA61BG6oXkuZUMYYXKF2wW90OCrAqmlCNU2opomaHbTswa_d8X9Qvc9GLydH2jp8rNzPn0OHleI5zWvyaaLI9JHAcDhXc_oLVn1thQ</recordid><startdate>201205</startdate><enddate>201205</enddate><creator>Sahinoglu, Mehmet</creator><creator>Cueva-Parra, Luis</creator><creator>Ang, David</creator><general>John Wiley & Sons, Inc</general><general>Wiley Subscription Services, Inc</general><scope>BSCLL</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7QH</scope><scope>7UA</scope><scope>C1K</scope><scope>F1W</scope><scope>H96</scope><scope>H97</scope><scope>JQ2</scope><scope>L.G</scope></search><sort><creationdate>201205</creationdate><title>Game-theoretic computing in risk analysis</title><author>Sahinoglu, Mehmet ; Cueva-Parra, Luis ; Ang, David</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c3355-558d84dadcb9d51180cd6176348261311622afea4ee9a63f92d1649728ddfdd13</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2012</creationdate><topic>Algorithms</topic><topic>Calculators</topic><topic>Computation</topic><topic>Computer applications</topic><topic>Cybersecurity</topic><topic>Dating techniques</topic><topic>Economic resources</topic><topic>Game theory</topic><topic>game-theoretic</topic><topic>Health care</topic><topic>Historical account</topic><topic>Informatics</topic><topic>Information warfare</topic><topic>Linear programming</topic><topic>Methods</topic><topic>mixed strategy</topic><topic>Nash equilibrium</topic><topic>Optimization</topic><topic>Risk analysis</topic><topic>Risk assessment</topic><topic>Risk management</topic><topic>Security</topic><topic>Solutions</topic><topic>Trustworthiness</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Sahinoglu, Mehmet</creatorcontrib><creatorcontrib>Cueva-Parra, Luis</creatorcontrib><creatorcontrib>Ang, David</creatorcontrib><collection>Istex</collection><collection>CrossRef</collection><collection>Aqualine</collection><collection>Water Resources Abstracts</collection><collection>Environmental Sciences and Pollution Management</collection><collection>ASFA: Aquatic Sciences and Fisheries Abstracts</collection><collection>Aquatic Science & Fisheries Abstracts (ASFA) 2: Ocean Technology, Policy & Non-Living Resources</collection><collection>Aquatic Science & Fisheries Abstracts (ASFA) 3: Aquatic Pollution & Environmental Quality</collection><collection>ProQuest Computer Science Collection</collection><collection>Aquatic Science & Fisheries Abstracts (ASFA) Professional</collection><jtitle>Wiley interdisciplinary reviews. Computational statistics</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Sahinoglu, Mehmet</au><au>Cueva-Parra, Luis</au><au>Ang, David</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Game-theoretic computing in risk analysis</atitle><jtitle>Wiley interdisciplinary reviews. Computational statistics</jtitle><addtitle>WIREs Comp Stat</addtitle><date>2012-05</date><risdate>2012</risdate><volume>4</volume><issue>3</issue><spage>227</spage><epage>248</epage><pages>227-248</pages><issn>1939-5108</issn><eissn>1939-0068</eissn><abstract>Risk analysis, comprising risk assessment and risk management stages, is one of the most popular and challenging topics of our times because security and privacy, and availability and usability culminating at the trustworthiness of cybersystems and cyber information is at stake. The precautionary need derives from the existence of defenders versus adversaries, in an everlasting Darwinian scenario dating back to early human history of warriors fighting for their sustenance to survive. Fast forwarding to today's information warfare, whether in networks or healthcare or national security, the currently dire situation necessitates more than a hand calculator to optimize (maximize gains or minimize losses) risk due to prevailing scarce economic resources. This article reviews the previous works completed on this specialized topic of game‐theoretic computing, its methods and applications toward the purpose of quantitative risk assessment and cost‐optimal management in many diverse disciplines including entire range of informatics‐related topics. Additionally, this review considers certain game‐theoretic topics in depth historically, and those computationally resourceful such as Neumann's two‐way zero‐sum pure equilibrium and optimal mixed strategy solutions versus Nash equilibria with pure and mixed strategies. Computational examples are provided to highlight the significance of game‐theoretic solutions used in risk assessment and management, particularly in reference to cybersystems and information security. WIREs Comput Stat 2012, 4:227–248. doi: 10.1002/wics.1205
This article is categorized under:
Algorithms and Computational Methods > Linear Programming
Algorithms and Computational Methods > Networks and Security</abstract><cop>Hoboken, USA</cop><pub>John Wiley & Sons, Inc</pub><doi>10.1002/wics.1205</doi><tpages>22</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1939-5108 |
ispartof | Wiley interdisciplinary reviews. Computational statistics, 2012-05, Vol.4 (3), p.227-248 |
issn | 1939-5108 1939-0068 |
language | eng |
recordid | cdi_proquest_journals_1971717801 |
source | Wiley |
subjects | Algorithms Calculators Computation Computer applications Cybersecurity Dating techniques Economic resources Game theory game-theoretic Health care Historical account Informatics Information warfare Linear programming Methods mixed strategy Nash equilibrium Optimization Risk analysis Risk assessment Risk management Security Solutions Trustworthiness |
title | Game-theoretic computing in risk analysis |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-05T00%3A37%3A20IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Game-theoretic%20computing%20in%20risk%20analysis&rft.jtitle=Wiley%20interdisciplinary%20reviews.%20Computational%20statistics&rft.au=Sahinoglu,%20Mehmet&rft.date=2012-05&rft.volume=4&rft.issue=3&rft.spage=227&rft.epage=248&rft.pages=227-248&rft.issn=1939-5108&rft.eissn=1939-0068&rft_id=info:doi/10.1002/wics.1205&rft_dat=%3Cproquest_cross%3E1971717801%3C/proquest_cross%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c3355-558d84dadcb9d51180cd6176348261311622afea4ee9a63f92d1649728ddfdd13%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=1971717801&rft_id=info:pmid/&rfr_iscdi=true |