메뉴 건너뛰기




Volumn 8, Issue 1, 2005, Pages 78-118

Incentive-based modeling and inference of attacker intent, objectives, and strategies

Author keywords

Attack strategy inference; Attacker intent and strategy modeling; Game theory

Indexed keywords

ATTACK STRATEGY INFERENCE; ATTACKER INTENT AND STRATEGY MODELING; CYBER DEFENSE; REAL-WORLD ATTACK;

EID: 16644384919     PISSN: 10949224     EISSN: None     Source Type: Journal    
DOI: 10.1145/1053283.1053288     Document Type: Article
Times cited : (159)

References (33)
  • 4
    • 34250446073 scopus 로고
    • Multipart pricing of public goods
    • CLARKE, E. H. 1971. Multipart pricing of public goods. Public Choice 11, 17-33.
    • (1971) Public Choice , vol.11 , pp. 17-33
    • Clarke, E.H.1
  • 9
    • 0038223766 scopus 로고    scopus 로고
    • Using information security as a response to competitor analysis systems
    • GORDON, L. A. AND LOEB, M. P. 2001. Using information security as a response to competitor analysis systems. Commun. ACM 9, 44.
    • (2001) Commun. ACM , vol.9 , pp. 44
    • Gordon, L.A.1    Loeb, M.P.2
  • 10
    • 0001314984 scopus 로고
    • Incentives in teams
    • GROVES, T. 1973. Incentives in teams. Econometrica 41, 617-663.
    • (1973) Econometrica , vol.41 , pp. 617-663
    • Groves, T.1
  • 15
    • 0034513874 scopus 로고    scopus 로고
    • Intrusion confinement by isolation in information systems
    • Liu, P., JAJODIA, S., AND MCCOLLUM, C. D. 2000. Intrusion confinement by isolation in information systems. J. Comput. Security 8, 4, 243-279.
    • (2000) J. Comput. Security , vol.8 , Issue.4 , pp. 243-279
    • Liu, P.1    Jajodia, S.2    Mccollum, C.D.3
  • 16
    • 0027609384 scopus 로고
    • A survey of intrusion detection techniques
    • LUNT, T. F. 1993. A survey of intrusion detection techniques. Computers & Security 4, 12 (June), 405-418.
    • (1993) Computers & Security , vol.4 , Issue.12 JUNE , pp. 405-418
    • Lunt, T.F.1
  • 18
    • 0034479192 scopus 로고    scopus 로고
    • Secure execution of java applets using a remote playground
    • MALKHI, D. AND REITER, M. K 2000, Secure execution of java applets using a remote playground. IEEE Trans. Software Eng. 26, 12.
    • (2000) IEEE Trans. Software Eng. , vol.26 , pp. 12
    • Malkhi, D.1    Reiter, M.K.2
  • 20
    • 0012127229 scopus 로고    scopus 로고
    • Intrusion and intrusion detection
    • McHUGH, J. 2001. Intrusion and intrusion detection. Int. J. Inf. Security 1, 14-35.
    • (2001) Int. J. Inf. Security , vol.1 , pp. 14-35
    • McHugh, J.1
  • 26
    • 0000421874 scopus 로고    scopus 로고
    • Algorithmic mechanism design
    • NS2. The network simulator
    • NISAN, N. AND RONAN, A. 2001. Algorithmic mechanism design. Games and Economic Behavior 35. NS2. The network simulator, http://www.isi.edu/nsnam/ns/.
    • (2001) Games and Economic Behavior , vol.35
    • Nisan, N.1    Ronan, A.2
  • 29
    • 84980096808 scopus 로고
    • Counterspeculation, auctions, and competitive sealed tenders
    • VICKREY, W. 1961. Counterspeculation, auctions, and competitive sealed tenders. J. Finance 16, 8-37.
    • (1961) J. Finance , vol.16 , pp. 8-37
    • Vickrey, W.1
  • 32
    • 0037328484 scopus 로고    scopus 로고
    • Sustaining availability of web services under distributed denial of service attacks
    • XU, J. AND LEE, W. 2003. Sustaining availability of web services under distributed denial of service attacks. IEEE Trans. Comput. 52, 4 (Feb.), 195-208.
    • (2003) IEEE Trans. Comput. , vol.52 , Issue.4 FEB , pp. 195-208
    • Xu, J.1    Lee, W.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.