메뉴 건너뛰기




Volumn 5185 LNCS, Issue , 2008, Pages 151-162

A generic intrusion detection game model in IT Security

Author keywords

Internal attacker; Intrusion Detection; Noncooperative Game Theory

Indexed keywords

COMPUTER CRIME; DECISION MAKING; DIGITAL ARITHMETIC; GAME THEORY; SECURITY SYSTEMS; SENSORS;

EID: 52149104711     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-85735-8_15     Document Type: Conference Paper
Times cited : (4)

References (16)
  • 1
    • 16444367583 scopus 로고    scopus 로고
    • Is Computer Science Science?
    • Denning, P.: Is Computer Science Science? Communication of the ACM 48(4), 27-31 (2005)
    • (2005) Communication of the ACM , vol.48 , Issue.4 , pp. 27-31
    • Denning, P.1
  • 3
  • 4
  • 8
    • 0042474230 scopus 로고    scopus 로고
    • Detecting Network Intrusions via Sampling: A Game Theoretic Approach
    • San Fransisco March
    • Kodialam, M., Lakshman, T.: Detecting Network Intrusions via Sampling: A Game Theoretic Approach. In: Proc. of the IEEE INFOCOM 2003, San Fransisco (March 2003)
    • (2003) Proc. of the IEEE INFOCOM
    • Kodialam, M.1    Lakshman, T.2
  • 9
    • 15944395410 scopus 로고    scopus 로고
    • A Game Theoretic Approach to Modeling Intrusion Detection in Mobile Ad Hoc Networks
    • United States Military Academy, West Point, NY, pp, June
    • Patcha, A., Park, J.: A Game Theoretic Approach to Modeling Intrusion Detection in Mobile Ad Hoc Networks. In: Proc. of the 2004 IEEE Workshop on Information Assurance and Security, United States Military Academy, West Point, NY, pp. 280-284 (June 2004)
    • (2004) Proc. of the 2004 IEEE Workshop on Information Assurance and Security , pp. 280-284
    • Patcha, A.1    Park, J.2
  • 10
    • 84874825833 scopus 로고    scopus 로고
    • A Game Theoretic Formulation for Intrusion Detection in Mobile Ad Hoc Networks
    • Patcha, A., Park, J.: A Game Theoretic Formulation for Intrusion Detection in Mobile Ad Hoc Networks. International Journal of Network Security 2(2), 131-137 (2006)
    • (2006) International Journal of Network Security , vol.2 , Issue.2 , pp. 131-137
    • Patcha, A.1    Park, J.2
  • 11
    • 38149061688 scopus 로고    scopus 로고
    • Preventing DoS Attacks in Wireless Sensor Networks: A Repeated Game Theory Approach
    • Agah, A., Das, S.K.: Preventing DoS Attacks in Wireless Sensor Networks: A Repeated Game Theory Approach. International Journal of Network Security 5(2), 145-153 (2007)
    • (2007) International Journal of Network Security , vol.5 , Issue.2 , pp. 145-153
    • Agah, A.1    Das, S.K.2
  • 14
    • 52149101743 scopus 로고    scopus 로고
    • McKelvey, R.D, McLennan, A.M, Turocy, T.L, Gambit: Software Tools for Game Theory, version 0.2007.01.30 January 2007, accessed May 20, 2008
    • McKelvey, R.D., McLennan, A.M., Turocy, T.L.: Gambit: Software Tools for Game Theory, version 0.2007.01.30 (January 2007) (accessed May 20, 2008), http://gambit.sourceforge.net
  • 16
    • 52149091351 scopus 로고    scopus 로고
    • Levine, D.K.: Repeated Games Step-by-Step (May 2002) (accessed March 1, 2008), http://www.dklevine.com/econ101/repeated-step.pfd
    • Levine, D.K.: Repeated Games Step-by-Step (May 2002) (accessed March 1, 2008), http://www.dklevine.com/econ101/repeated-step.pfd


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.