Главная
Study mode:
on
1
Intro
2
MOTIVATION
3
OUTLINE
4
WHAT'S IN A GAME?
5
A NORMAL FORM GAME
6
STRATEGIES
7
PRISONER'S DILEMMA
8
MATCHING PENNIES
9
DEADLOCK
10
STAG HUNT
11
CHICKEN
12
HAWK/DOVE
13
BATTLE OF THE SEXES
14
WHAT HAVE WE SEEN SO FAR?
15
EQUILIBRIUM
16
MIND GAMES
17
TYPES OF INTERACTIONS
18
BERNE'S GAMES: STRUCTURE
19
BERNE'S GAMES: EXAMPLES
20
THE BADGER GAME
21
TROLLING
22
THE SETUP
23
BOTH SPLIT
24
ONE SPLITS, ONE STEALS
25
OBSERVATION
26
SIGNALING
27
THE COMPLETE PATH
28
ITERATED GAMES
29
PROPERTIES
30
SOCIETAL ITERATED GAME THEORY
31
EVOLUTION IS A HARSH MISTRESS
32
PEACEKEEPING
Description:
Explore game theory concepts and their applications in cybersecurity through this comprehensive conference talk from BSidesLV 2014. Delve into various game types, including Prisoner's Dilemma, Matching Pennies, and Hawk/Dove, while examining strategies, equilibrium, and mind games. Investigate Eric Berne's transactional analysis games, the Badger Game, and trolling techniques. Learn about iterated games, their properties, and societal implications. Gain insights into signaling, peacekeeping, and the role of evolution in game theory. Discover how these strategies can be applied to real-world scenarios in information security and beyond.

Strategies Without Frontiers - Game Theory in Security

Add to list
0:00 / 0:00