Loading…

Game-theoretic computing in risk analysis

Risk analysis, comprising risk assessment and risk management stages, is one of the most popular and challenging topics of our times because security and privacy, and availability and usability culminating at the trustworthiness of cybersystems and cyber information is at stake. The precautionary ne...

Full description

Saved in:
Bibliographic Details
Published in:Wiley interdisciplinary reviews. Computational statistics 2012-05, Vol.4 (3), p.227-248
Main Authors: Sahinoglu, Mehmet, Cueva-Parra, Luis, Ang, David
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by cdi_FETCH-LOGICAL-c3355-558d84dadcb9d51180cd6176348261311622afea4ee9a63f92d1649728ddfdd13
cites cdi_FETCH-LOGICAL-c3355-558d84dadcb9d51180cd6176348261311622afea4ee9a63f92d1649728ddfdd13
container_end_page 248
container_issue 3
container_start_page 227
container_title Wiley interdisciplinary reviews. Computational statistics
container_volume 4
creator Sahinoglu, Mehmet
Cueva-Parra, Luis
Ang, David
description Risk analysis, comprising risk assessment and risk management stages, is one of the most popular and challenging topics of our times because security and privacy, and availability and usability culminating at the trustworthiness of cybersystems and cyber information is at stake. The precautionary need derives from the existence of defenders versus adversaries, in an everlasting Darwinian scenario dating back to early human history of warriors fighting for their sustenance to survive. Fast forwarding to today's information warfare, whether in networks or healthcare or national security, the currently dire situation necessitates more than a hand calculator to optimize (maximize gains or minimize losses) risk due to prevailing scarce economic resources. This article reviews the previous works completed on this specialized topic of game‐theoretic computing, its methods and applications toward the purpose of quantitative risk assessment and cost‐optimal management in many diverse disciplines including entire range of informatics‐related topics. Additionally, this review considers certain game‐theoretic topics in depth historically, and those computationally resourceful such as Neumann's two‐way zero‐sum pure equilibrium and optimal mixed strategy solutions versus Nash equilibria with pure and mixed strategies. Computational examples are provided to highlight the significance of game‐theoretic solutions used in risk assessment and management, particularly in reference to cybersystems and information security. WIREs Comput Stat 2012, 4:227–248. doi: 10.1002/wics.1205 This article is categorized under: Algorithms and Computational Methods > Linear Programming Algorithms and Computational Methods > Networks and Security
doi_str_mv 10.1002/wics.1205
format article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_1971717801</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>1971717801</sourcerecordid><originalsourceid>FETCH-LOGICAL-c3355-558d84dadcb9d51180cd6176348261311622afea4ee9a63f92d1649728ddfdd13</originalsourceid><addsrcrecordid>eNp1kEtPwzAQhC0EEqVw4B9E4tRDWq8dO_aRVvSlAgdAHC1jO-C-UuxUpf-eRKm4oTnsavXNajQI3QLuA8ZkcPAm9oFgdoY6IKlMMebi_LQzwOISXcW4rK95rQ7qTfTGpdWXK4OrvElMudntK7_9TPw2CT6uEr3V62P08RpdFHod3c1pdtHb-OF1NE0Xz5PZ6H6RGkoZSxkTVmRWW_MhLQMQ2FgOOaeZIBwoACdEF05nzknNaSGJBZ7JnAhrC2uBdtFd-3cXyu-9i5ValvtQh4gKZA61BG6oXkuZUMYYXKF2wW90OCrAqmlCNU2opomaHbTswa_d8X9Qvc9GLydH2jp8rNzPn0OHleI5zWvyaaLI9JHAcDhXc_oLVn1thQ</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1971717801</pqid></control><display><type>article</type><title>Game-theoretic computing in risk analysis</title><source>Wiley</source><creator>Sahinoglu, Mehmet ; Cueva-Parra, Luis ; Ang, David</creator><creatorcontrib>Sahinoglu, Mehmet ; Cueva-Parra, Luis ; Ang, David</creatorcontrib><description>Risk analysis, comprising risk assessment and risk management stages, is one of the most popular and challenging topics of our times because security and privacy, and availability and usability culminating at the trustworthiness of cybersystems and cyber information is at stake. The precautionary need derives from the existence of defenders versus adversaries, in an everlasting Darwinian scenario dating back to early human history of warriors fighting for their sustenance to survive. Fast forwarding to today's information warfare, whether in networks or healthcare or national security, the currently dire situation necessitates more than a hand calculator to optimize (maximize gains or minimize losses) risk due to prevailing scarce economic resources. This article reviews the previous works completed on this specialized topic of game‐theoretic computing, its methods and applications toward the purpose of quantitative risk assessment and cost‐optimal management in many diverse disciplines including entire range of informatics‐related topics. Additionally, this review considers certain game‐theoretic topics in depth historically, and those computationally resourceful such as Neumann's two‐way zero‐sum pure equilibrium and optimal mixed strategy solutions versus Nash equilibria with pure and mixed strategies. Computational examples are provided to highlight the significance of game‐theoretic solutions used in risk assessment and management, particularly in reference to cybersystems and information security. WIREs Comput Stat 2012, 4:227–248. doi: 10.1002/wics.1205 This article is categorized under: Algorithms and Computational Methods &gt; Linear Programming Algorithms and Computational Methods &gt; Networks and Security</description><identifier>ISSN: 1939-5108</identifier><identifier>EISSN: 1939-0068</identifier><identifier>DOI: 10.1002/wics.1205</identifier><language>eng</language><publisher>Hoboken, USA: John Wiley &amp; Sons, Inc</publisher><subject>Algorithms ; Calculators ; Computation ; Computer applications ; Cybersecurity ; Dating techniques ; Economic resources ; Game theory ; game-theoretic ; Health care ; Historical account ; Informatics ; Information warfare ; Linear programming ; Methods ; mixed strategy ; Nash equilibrium ; Optimization ; Risk analysis ; Risk assessment ; Risk management ; Security ; Solutions ; Trustworthiness</subject><ispartof>Wiley interdisciplinary reviews. Computational statistics, 2012-05, Vol.4 (3), p.227-248</ispartof><rights>Copyright © 2012 Wiley Periodicals, Inc.</rights><rights>Copyright Wiley Subscription Services, Inc. May/Jun 2012</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c3355-558d84dadcb9d51180cd6176348261311622afea4ee9a63f92d1649728ddfdd13</citedby><cites>FETCH-LOGICAL-c3355-558d84dadcb9d51180cd6176348261311622afea4ee9a63f92d1649728ddfdd13</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,27924,27925</link.rule.ids></links><search><creatorcontrib>Sahinoglu, Mehmet</creatorcontrib><creatorcontrib>Cueva-Parra, Luis</creatorcontrib><creatorcontrib>Ang, David</creatorcontrib><title>Game-theoretic computing in risk analysis</title><title>Wiley interdisciplinary reviews. Computational statistics</title><addtitle>WIREs Comp Stat</addtitle><description>Risk analysis, comprising risk assessment and risk management stages, is one of the most popular and challenging topics of our times because security and privacy, and availability and usability culminating at the trustworthiness of cybersystems and cyber information is at stake. The precautionary need derives from the existence of defenders versus adversaries, in an everlasting Darwinian scenario dating back to early human history of warriors fighting for their sustenance to survive. Fast forwarding to today's information warfare, whether in networks or healthcare or national security, the currently dire situation necessitates more than a hand calculator to optimize (maximize gains or minimize losses) risk due to prevailing scarce economic resources. This article reviews the previous works completed on this specialized topic of game‐theoretic computing, its methods and applications toward the purpose of quantitative risk assessment and cost‐optimal management in many diverse disciplines including entire range of informatics‐related topics. Additionally, this review considers certain game‐theoretic topics in depth historically, and those computationally resourceful such as Neumann's two‐way zero‐sum pure equilibrium and optimal mixed strategy solutions versus Nash equilibria with pure and mixed strategies. Computational examples are provided to highlight the significance of game‐theoretic solutions used in risk assessment and management, particularly in reference to cybersystems and information security. WIREs Comput Stat 2012, 4:227–248. doi: 10.1002/wics.1205 This article is categorized under: Algorithms and Computational Methods &gt; Linear Programming Algorithms and Computational Methods &gt; Networks and Security</description><subject>Algorithms</subject><subject>Calculators</subject><subject>Computation</subject><subject>Computer applications</subject><subject>Cybersecurity</subject><subject>Dating techniques</subject><subject>Economic resources</subject><subject>Game theory</subject><subject>game-theoretic</subject><subject>Health care</subject><subject>Historical account</subject><subject>Informatics</subject><subject>Information warfare</subject><subject>Linear programming</subject><subject>Methods</subject><subject>mixed strategy</subject><subject>Nash equilibrium</subject><subject>Optimization</subject><subject>Risk analysis</subject><subject>Risk assessment</subject><subject>Risk management</subject><subject>Security</subject><subject>Solutions</subject><subject>Trustworthiness</subject><issn>1939-5108</issn><issn>1939-0068</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2012</creationdate><recordtype>article</recordtype><recordid>eNp1kEtPwzAQhC0EEqVw4B9E4tRDWq8dO_aRVvSlAgdAHC1jO-C-UuxUpf-eRKm4oTnsavXNajQI3QLuA8ZkcPAm9oFgdoY6IKlMMebi_LQzwOISXcW4rK95rQ7qTfTGpdWXK4OrvElMudntK7_9TPw2CT6uEr3V62P08RpdFHod3c1pdtHb-OF1NE0Xz5PZ6H6RGkoZSxkTVmRWW_MhLQMQ2FgOOaeZIBwoACdEF05nzknNaSGJBZ7JnAhrC2uBdtFd-3cXyu-9i5ValvtQh4gKZA61BG6oXkuZUMYYXKF2wW90OCrAqmlCNU2opomaHbTswa_d8X9Qvc9GLydH2jp8rNzPn0OHleI5zWvyaaLI9JHAcDhXc_oLVn1thQ</recordid><startdate>201205</startdate><enddate>201205</enddate><creator>Sahinoglu, Mehmet</creator><creator>Cueva-Parra, Luis</creator><creator>Ang, David</creator><general>John Wiley &amp; Sons, Inc</general><general>Wiley Subscription Services, Inc</general><scope>BSCLL</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7QH</scope><scope>7UA</scope><scope>C1K</scope><scope>F1W</scope><scope>H96</scope><scope>H97</scope><scope>JQ2</scope><scope>L.G</scope></search><sort><creationdate>201205</creationdate><title>Game-theoretic computing in risk analysis</title><author>Sahinoglu, Mehmet ; Cueva-Parra, Luis ; Ang, David</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c3355-558d84dadcb9d51180cd6176348261311622afea4ee9a63f92d1649728ddfdd13</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2012</creationdate><topic>Algorithms</topic><topic>Calculators</topic><topic>Computation</topic><topic>Computer applications</topic><topic>Cybersecurity</topic><topic>Dating techniques</topic><topic>Economic resources</topic><topic>Game theory</topic><topic>game-theoretic</topic><topic>Health care</topic><topic>Historical account</topic><topic>Informatics</topic><topic>Information warfare</topic><topic>Linear programming</topic><topic>Methods</topic><topic>mixed strategy</topic><topic>Nash equilibrium</topic><topic>Optimization</topic><topic>Risk analysis</topic><topic>Risk assessment</topic><topic>Risk management</topic><topic>Security</topic><topic>Solutions</topic><topic>Trustworthiness</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Sahinoglu, Mehmet</creatorcontrib><creatorcontrib>Cueva-Parra, Luis</creatorcontrib><creatorcontrib>Ang, David</creatorcontrib><collection>Istex</collection><collection>CrossRef</collection><collection>Aqualine</collection><collection>Water Resources Abstracts</collection><collection>Environmental Sciences and Pollution Management</collection><collection>ASFA: Aquatic Sciences and Fisheries Abstracts</collection><collection>Aquatic Science &amp; Fisheries Abstracts (ASFA) 2: Ocean Technology, Policy &amp; Non-Living Resources</collection><collection>Aquatic Science &amp; Fisheries Abstracts (ASFA) 3: Aquatic Pollution &amp; Environmental Quality</collection><collection>ProQuest Computer Science Collection</collection><collection>Aquatic Science &amp; Fisheries Abstracts (ASFA) Professional</collection><jtitle>Wiley interdisciplinary reviews. Computational statistics</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Sahinoglu, Mehmet</au><au>Cueva-Parra, Luis</au><au>Ang, David</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Game-theoretic computing in risk analysis</atitle><jtitle>Wiley interdisciplinary reviews. Computational statistics</jtitle><addtitle>WIREs Comp Stat</addtitle><date>2012-05</date><risdate>2012</risdate><volume>4</volume><issue>3</issue><spage>227</spage><epage>248</epage><pages>227-248</pages><issn>1939-5108</issn><eissn>1939-0068</eissn><abstract>Risk analysis, comprising risk assessment and risk management stages, is one of the most popular and challenging topics of our times because security and privacy, and availability and usability culminating at the trustworthiness of cybersystems and cyber information is at stake. The precautionary need derives from the existence of defenders versus adversaries, in an everlasting Darwinian scenario dating back to early human history of warriors fighting for their sustenance to survive. Fast forwarding to today's information warfare, whether in networks or healthcare or national security, the currently dire situation necessitates more than a hand calculator to optimize (maximize gains or minimize losses) risk due to prevailing scarce economic resources. This article reviews the previous works completed on this specialized topic of game‐theoretic computing, its methods and applications toward the purpose of quantitative risk assessment and cost‐optimal management in many diverse disciplines including entire range of informatics‐related topics. Additionally, this review considers certain game‐theoretic topics in depth historically, and those computationally resourceful such as Neumann's two‐way zero‐sum pure equilibrium and optimal mixed strategy solutions versus Nash equilibria with pure and mixed strategies. Computational examples are provided to highlight the significance of game‐theoretic solutions used in risk assessment and management, particularly in reference to cybersystems and information security. WIREs Comput Stat 2012, 4:227–248. doi: 10.1002/wics.1205 This article is categorized under: Algorithms and Computational Methods &gt; Linear Programming Algorithms and Computational Methods &gt; Networks and Security</abstract><cop>Hoboken, USA</cop><pub>John Wiley &amp; Sons, Inc</pub><doi>10.1002/wics.1205</doi><tpages>22</tpages></addata></record>
fulltext fulltext
identifier ISSN: 1939-5108
ispartof Wiley interdisciplinary reviews. Computational statistics, 2012-05, Vol.4 (3), p.227-248
issn 1939-5108
1939-0068
language eng
recordid cdi_proquest_journals_1971717801
source Wiley
subjects Algorithms
Calculators
Computation
Computer applications
Cybersecurity
Dating techniques
Economic resources
Game theory
game-theoretic
Health care
Historical account
Informatics
Information warfare
Linear programming
Methods
mixed strategy
Nash equilibrium
Optimization
Risk analysis
Risk assessment
Risk management
Security
Solutions
Trustworthiness
title Game-theoretic computing in risk analysis
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-05T00%3A37%3A20IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Game-theoretic%20computing%20in%20risk%20analysis&rft.jtitle=Wiley%20interdisciplinary%20reviews.%20Computational%20statistics&rft.au=Sahinoglu,%20Mehmet&rft.date=2012-05&rft.volume=4&rft.issue=3&rft.spage=227&rft.epage=248&rft.pages=227-248&rft.issn=1939-5108&rft.eissn=1939-0068&rft_id=info:doi/10.1002/wics.1205&rft_dat=%3Cproquest_cross%3E1971717801%3C/proquest_cross%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c3355-558d84dadcb9d51180cd6176348261311622afea4ee9a63f92d1649728ddfdd13%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=1971717801&rft_id=info:pmid/&rfr_iscdi=true