Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Strategies Without Frontiers - Game Theory in Security

via YouTube

Overview

Explore game theory concepts and their applications in cybersecurity through this comprehensive conference talk from BSidesLV 2014. Delve into various game types, including Prisoner's Dilemma, Matching Pennies, and Hawk/Dove, while examining strategies, equilibrium, and mind games. Investigate Eric Berne's transactional analysis games, the Badger Game, and trolling techniques. Learn about iterated games, their properties, and societal implications. Gain insights into signaling, peacekeeping, and the role of evolution in game theory. Discover how these strategies can be applied to real-world scenarios in information security and beyond.

Syllabus

Intro
MOTIVATION
OUTLINE
WHAT'S IN A GAME?
A NORMAL FORM GAME
STRATEGIES
PRISONER'S DILEMMA
MATCHING PENNIES
DEADLOCK
STAG HUNT
CHICKEN
HAWK/DOVE
BATTLE OF THE SEXES
WHAT HAVE WE SEEN SO FAR?
EQUILIBRIUM
MIND GAMES
TYPES OF INTERACTIONS
BERNE'S GAMES: STRUCTURE
BERNE'S GAMES: EXAMPLES
THE BADGER GAME
TROLLING
THE SETUP
BOTH SPLIT
ONE SPLITS, ONE STEALS
OBSERVATION
SIGNALING
THE COMPLETE PATH
ITERATED GAMES
PROPERTIES
SOCIETAL ITERATED GAME THEORY
EVOLUTION IS A HARSH MISTRESS
PEACEKEEPING

Reviews

Start your review of Strategies Without Frontiers - Game Theory in Security

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.