Online Games and Security Issues

被引:0
作者
Robles, Rosslin John [1 ]
Yeo, Sang-Soo [2 ]
Moon, Young-Deuk [3 ]
Park, Gilcheol [1 ]
Kim, Seoksoo [1 ]
机构
[1] Hannam Univ, Sch Multimedia, Taejon, South Korea
[2] BTWorks In, R&D Dept, Seoul, South Korea
[3] Univ Foreign, Busan, South Korea
来源
FGCN: PROCEEDINGS OF THE 2008 SECOND INTERNATIONAL CONFERENCE ON FUTURE GENERATION COMMUNICATION AND NETWORKING, VOLS 1 AND 2 | 2008年
关键词
Online Games; Security; Cheats; Threats;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The Online game industry has grown a lot this past decade. Cheating in online games is an aspect of computer games that has so far received skimp attention from researchers on game studies. Cheats does not only affect the cheater but also other players. Cheating has become illegal since it poses security threats. This paper discusses security problems in online games. This study intends to help understand these attacks not only as a problem of security in online games but also as the basis of threats against future cooperative computer systems.
引用
收藏
页码:641 / +
页数:2
相关论文
共 50 条
[21]   Security Issues and Vulnerabilities in Connected Car Systems [J].
Becsi, Tamas ;
Aradi, Szilard ;
Gaspar, Peter .
2015 INTERNATIONAL CONFERENCE ON MODELS AND TECHNOLOGIES FOR INTELLIGENT TRANSPORTATION SYSTEMS (MT-ITS), 2015, :477-482
[22]   Issues in Wireless Sensor Networks with an Emphasis on Security [J].
Sharma, Kartik ;
Sharma, Sheeba .
ICCCE 2018, 2019, 500 :419-425
[23]   Security Games with Partial Surveillance [J].
Zhang, Youzhi ;
Luo, Xudong .
AAMAS'14: PROCEEDINGS OF THE 2014 INTERNATIONAL CONFERENCE ON AUTONOMOUS AGENTS & MULTIAGENT SYSTEMS, 2014, :1527-1528
[24]   Issues with Various Security Threats on Mobile Phones [J].
Nseir, Sana ;
Hirzallah, Nael ;
Aqel, Musbah .
PROCEEDINGS OF THE 2013 PALESTINIAN INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY (PICICT), 2013, :37-42
[25]   Security Issues in Wireless Sensor Network - A Review [J].
Grover, Jitender ;
Sharma, Shikha .
2016 5TH INTERNATIONAL CONFERENCE ON RELIABILITY, INFOCOM TECHNOLOGIES AND OPTIMIZATION (TRENDS AND FUTURE DIRECTIONS) (ICRITO), 2016, :397-404
[26]   An Overview of Security and Privacy Issues for Internet of Things [J].
Youm, Heung Youl .
IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2017, E100D (08) :1649-1662
[27]   Security Issues in Wireless Sensor Networks: A Survey [J].
Chowdhury, Mahfuzulhoq ;
Kader, Md Fazlul ;
Asaduzzaman .
INTERNATIONAL JOURNAL OF FUTURE GENERATION COMMUNICATION AND NETWORKING, 2013, 6 (05) :97-115
[28]   Security Games for Vehicular Networks [J].
Alpcan, Tansu ;
Buchegger, Sonja .
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2011, 10 (02) :280-290
[29]   Security Games with Market Insurance [J].
Johnson, Benjamin ;
Boehme, Rainer ;
Grossklags, Jens .
DECISION AND GAME THEORY FOR SECURITY: GAMESEC 2011, 2011, 7037 :117-+
[30]   Planning and Learning in Security Games [J].
Delle Fave, Francesco M. ;
Qian, Yundi ;
Jiang, Albert X. ;
Brown, Matthew ;
Tambe, Milind .
ACM SIGECOM EXCHANGES, 2013, 12 (01) :38-41