메뉴 건너뛰기




Volumn , Issue , 2003, Pages 179-189

Incentive-based modeling and inference of Attacker Intent, Objectives, and Strategies

Author keywords

Attack Prediction; Computer Security; Game Theory

Indexed keywords

COMPUTER CRIME; COMPUTER NETWORKS; GAME THEORY; RANDOM PROCESSES; RISK ASSESSMENT; TELECOMMUNICATION TRAFFIC;

EID: 14344258545     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/948109.948135     Document Type: Conference Paper
Times cited : (65)

References (34)
  • 4
    • 1642281565 scopus 로고    scopus 로고
    • Towards a game theory model of information warfare
    • Airforce Institute of Technology, Master's Thesis
    • D. Buike. Towards a game theory model of information warfare. Technical report, Airforce Institute of Technology, 1999. Master's Thesis.
    • (1999) Technical Report
    • Buike, D.1
  • 5
    • 34250446073 scopus 로고
    • Multipart pricing of public goods
    • E. H. Clarke. Multipart pricing of public goods. Public Choice, 11:17-33, 1971.
    • (1971) Public Choice , vol.11 , pp. 17-33
    • Clarke, E.H.1
  • 6
    • 0242550424 scopus 로고    scopus 로고
    • Complexity results about nash equilibria
    • Carnegie Mellon University, CMU-CS-02-135
    • V. Conitzer and T. Sandholm. Complexity results about nash equilibria. Technical report, Carnegie Mellon University, 2002. CMU-CS-02-135.
    • (2002) Technical Report
    • Conitzer, V.1    Sandholm, T.2
  • 11
    • 0038223766 scopus 로고    scopus 로고
    • Using information security as a response to competitor analysis systems
    • L. A. Gordon and M. P. Loeb. Using information security as a response to competitor analysis systems. Communications of the ACM, 44(9):70-75, 2001.
    • (2001) Communications of the ACM , vol.44 , Issue.9 , pp. 70-75
    • Gordon, L.A.1    Loeb, M.P.2
  • 12
    • 0001314984 scopus 로고
    • Incentives in teams
    • T. Groves. Incentives in teams. Econometrica, 41:617-663, 1973.
    • (1973) Econometrica , vol.41 , pp. 617-663
    • Groves, T.1
  • 18
    • 0034513874 scopus 로고    scopus 로고
    • Intrusion confinement by isolation in information systems
    • P. Liu, S. Jajodia, and C.D. McCollum. Intrusion confinement by isolation in information systems. Journal of Computer Security, 8(4):243-279, 2000.
    • (2000) Journal of Computer Security , vol.8 , Issue.4 , pp. 243-279
    • Liu, P.1    Jajodia, S.2    McCollum, C.D.3
  • 19
    • 0027609384 scopus 로고
    • A survey of intrusion detection techniques
    • June
    • T.F. Lunt. A Survey of Intrusion Detection Techniques. Computers & Security, 12 (4):405-418, June 1993.
    • (1993) Computers & Security , vol.12 , Issue.4 , pp. 405-418
    • Lunt, T.F.1
  • 30
    • 84980096808 scopus 로고
    • Counterspeculation, auctions, and competitive sealed tenders
    • W. Vickrey. Counterspeculation, auctions, and competitive sealed tenders. Journal of Finance, 16:8-37, 1961.
    • (1961) Journal of Finance , vol.16 , pp. 8-37
    • Vickrey, W.1
  • 34
    • 0037328484 scopus 로고    scopus 로고
    • Sustaining availability of web services under distributed denial of service attacks
    • February
    • J. Xu and W. Lee. Sustaining availability of web services under distributed denial of service attacks. In IEEE Transactions on Computer, 52(4):195-208, February 2003.
    • (2003) IEEE Transactions on Computer , vol.52 , Issue.4 , pp. 195-208
    • Xu, J.1    Lee, W.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.