Game Theoretical Model of Ransomware with Imperfect Information
Crossref DOI link: https://doi.org/10.1007/s11416-026-00596-2
Published Online: 2026-01-25
Update policy: https://doi.org/10.1007/springer_crossmark_policy
Denham, Byron
Thompson, Dale
Text and Data Mining valid from 2026-01-25
Version of Record valid from 2026-01-25
Article History
Received: 9 October 2025
Accepted: 7 January 2026
First Online: 25 January 2026
Declarations
:
: The authors declare no competing interests.