-
1
-
-
16444367583
-
Is Computer Science Science?
-
Denning, P.: Is Computer Science Science? Communication of the ACM 48(4), 27-31 (2005)
-
(2005)
Communication of the ACM
, vol.48
, Issue.4
, pp. 27-31
-
-
Denning, P.1
-
2
-
-
33751182081
-
Game theory
-
Gabbay, D.M, Smets, P, eds, Kluwer Academic Publishers, Dordrecht
-
Skyrms, B., Vanderschraaf, P.: Game theory. In: Gabbay, D.M., Smets, P. (eds.) Handbook of Defeasible Reasoning and Uncertainty Management Systems, pp. 391-439. Kluwer Academic Publishers, Dordrecht (1998)
-
(1998)
Handbook of Defeasible Reasoning and Uncertainty Management Systems
, pp. 391-439
-
-
Skyrms, B.1
Vanderschraaf, P.2
-
3
-
-
0037955677
-
The No Free Lunch Theorems: Complexity and Security
-
Ho, Y., Zhao, Q., Pepyne, D.: The No Free Lunch Theorems: Complexity and Security. IEEE Transactions on Automatic Control 48(5), 783-793 (2003)
-
(2003)
IEEE Transactions on Automatic Control
, vol.48
, Issue.5
, pp. 783-793
-
-
Ho, Y.1
Zhao, Q.2
Pepyne, D.3
-
5
-
-
1542288809
-
A Game Theoretic Approach to Decision and Analysis in Network Intrusion Detection
-
HI, pp, December
-
Alpcan, T., Basar, T.: A Game Theoretic Approach to Decision and Analysis in Network Intrusion Detection. In: Proc. of the 42rd IEEE Conference on Decision and Control (CDC), Maki, HI, pp. 2595-2600 (December 2003)
-
(2003)
Proc. of the 42rd IEEE Conference on Decision and Control (CDC), Maki
, pp. 2595-2600
-
-
Alpcan, T.1
Basar, T.2
-
6
-
-
14344257107
-
A Game Theoretic Analysis of Intrusion Detection in Access Control Systems
-
Bahamas, pp, December
-
Alpcan, T., Basar, T.: A Game Theoretic Analysis of Intrusion Detection in Access Control Systems. In: Proc. of the 43rd IEEE Conference on Decision and Control (CDC), Paradise Island, Bahamas, pp. 1568-1573 (December 2004)
-
(2004)
Proc. of the 43rd IEEE Conference on Decision and Control (CDC), Paradise Island
, pp. 1568-1573
-
-
Alpcan, T.1
Basar, T.2
-
8
-
-
0042474230
-
Detecting Network Intrusions via Sampling: A Game Theoretic Approach
-
San Fransisco March
-
Kodialam, M., Lakshman, T.: Detecting Network Intrusions via Sampling: A Game Theoretic Approach. In: Proc. of the IEEE INFOCOM 2003, San Fransisco (March 2003)
-
(2003)
Proc. of the IEEE INFOCOM
-
-
Kodialam, M.1
Lakshman, T.2
-
9
-
-
15944395410
-
A Game Theoretic Approach to Modeling Intrusion Detection in Mobile Ad Hoc Networks
-
United States Military Academy, West Point, NY, pp, June
-
Patcha, A., Park, J.: A Game Theoretic Approach to Modeling Intrusion Detection in Mobile Ad Hoc Networks. In: Proc. of the 2004 IEEE Workshop on Information Assurance and Security, United States Military Academy, West Point, NY, pp. 280-284 (June 2004)
-
(2004)
Proc. of the 2004 IEEE Workshop on Information Assurance and Security
, pp. 280-284
-
-
Patcha, A.1
Park, J.2
-
10
-
-
84874825833
-
A Game Theoretic Formulation for Intrusion Detection in Mobile Ad Hoc Networks
-
Patcha, A., Park, J.: A Game Theoretic Formulation for Intrusion Detection in Mobile Ad Hoc Networks. International Journal of Network Security 2(2), 131-137 (2006)
-
(2006)
International Journal of Network Security
, vol.2
, Issue.2
, pp. 131-137
-
-
Patcha, A.1
Park, J.2
-
11
-
-
38149061688
-
Preventing DoS Attacks in Wireless Sensor Networks: A Repeated Game Theory Approach
-
Agah, A., Das, S.K.: Preventing DoS Attacks in Wireless Sensor Networks: A Repeated Game Theory Approach. International Journal of Network Security 5(2), 145-153 (2007)
-
(2007)
International Journal of Network Security
, vol.5
, Issue.2
, pp. 145-153
-
-
Agah, A.1
Das, S.K.2
-
14
-
-
52149101743
-
-
McKelvey, R.D, McLennan, A.M, Turocy, T.L, Gambit: Software Tools for Game Theory, version 0.2007.01.30 January 2007, accessed May 20, 2008
-
McKelvey, R.D., McLennan, A.M., Turocy, T.L.: Gambit: Software Tools for Game Theory, version 0.2007.01.30 (January 2007) (accessed May 20, 2008), http://gambit.sourceforge.net
-
-
-
-
16
-
-
52149091351
-
-
Levine, D.K.: Repeated Games Step-by-Step (May 2002) (accessed March 1, 2008), http://www.dklevine.com/econ101/repeated-step.pfd
-
Levine, D.K.: Repeated Games Step-by-Step (May 2002) (accessed March 1, 2008), http://www.dklevine.com/econ101/repeated-step.pfd
-
-
-
|