{"title":"Game Theory","authors":"W. Patterson, Cynthia E. Winston-Proctor","doi":"10.1201/9780429461484-13","DOIUrl":"https://doi.org/10.1201/9780429461484-13","url":null,"abstract":"Combinatorial games, a branch of game theory, allows us to further understand the topic of decision making and uses simple games to work out different strategies that result in various outcomes. It introduces rational thinking where a player makes decisions based on the outcomes it will bring them. This method of thinking can be applied to larger fields such as economics and finance for parties to maximize their own income. In this paper, we will explore game theory in the branch combinatorial games through a broad view. This will be done through the aid of the game Pick-Up-Bricks and game trees. We will then take a deeper look into a category of combinatorial games, Normal-Play Games. To understand how they work, we will look at the example of Cut-cake. We will continue on to talk about the four different types of games, sum of games, and the properties of positions in normal play games. Afterwards, we will discuss impartial games and introduce the MEX Principle by analysing the game Nim. Lastly, we will apply the MEX Principle to the game of Shade.","PeriodicalId":137249,"journal":{"name":"Behavioral Cybersecurity","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121283829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modern Cryptography","authors":"W. Patterson, Cynthia E. Winston-Proctor","doi":"10.1201/9780429461484-19","DOIUrl":"https://doi.org/10.1201/9780429461484-19","url":null,"abstract":"We live in an age where we willingly provide our social security number, credit card information, home address and countless other sensitive information over the Internet. Whether you are buying a phone case from Amazon, sending in an on-line job application, or logging into your on-line bank account, you trust that the sensitive data you enter is secure. As our technology and computing power become more sophisticated, so do the tools used by potential hackers to our information. In this paper, the underlying mathematics within ciphers will be looked at to understand the security of modern ciphers. An extremely important algorithm in today’s practice is the Advanced Encryption Standard (AES), which is used by our very own National Security Agency (NSA) for data up to TOP SECRET. Another frequently used cipher is the RSA cryptosystem. Its security is based on the concept of prime factorization, and the fact that it is a hard problem to prime factorize huge numbers, numbers on the scale of 22048 or larger. Cryptanalysis, the study of breaking ciphers, will also be studied in this paper. Understanding effective attacks leads to understanding the construction of these very secure ciphers.","PeriodicalId":137249,"journal":{"name":"Behavioral Cybersecurity","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114281784","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Metric to Assess Cyberattacks","authors":"W. Patterson, M. E. Sone","doi":"10.1007/978-3-319-94782-2_4","DOIUrl":"https://doi.org/10.1007/978-3-319-94782-2_4","url":null,"abstract":"","PeriodicalId":137249,"journal":{"name":"Behavioral Cybersecurity","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115186851","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}