메뉴 건너뛰기




Volumn 2005, Issue , 2005, Pages 102-105

Using stochastic game theory to compute the expected behavior of attackers

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER CRIME; COMPUTER NETWORKS; GAME THEORY; RANDOM PROCESSES;

EID: 33947173819     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (49)

References (10)
  • 6
    • 0033325475 scopus 로고    scopus 로고
    • Experimenting with quantitative evaluation tools for monitoring operational security
    • Sept/Oct
    • R. Ortalo and Y. Deswaite. Experimenting with quantitative evaluation tools for monitoring operational security. IEEE Transactions on Software Engineering, 25(5):633-650, Sept/Oct 1999.
    • (1999) IEEE Transactions on Software Engineering , vol.25 , Issue.5 , pp. 633-650
    • Ortalo, R.1    Deswaite, Y.2
  • 7
    • 0004260006 scopus 로고
    • Academic Press, 2 edition
    • G. Owen. Game Theory. Academic Press, 2 edition, 1982.
    • (1982) Game Theory
    • Owen, G.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.