메뉴 건너뛰기




Volumn 2, Issue , 2008, Pages 249-253

A network security risk assessment framework based on Game Theory

Author keywords

[No Author keywords available]

Indexed keywords

ASSESSMENT SYSTEMS; COMPUTER NETWORK ATTACKS; COMPUTING MODELS; IN NETWORKS; RESEARCH AREAS; RISK ASSESSMENT FRAMEWORKS; SECURITY RISK ASSESSMENTS; STRATEGY SPACES;

EID: 62349090762     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/FGCN.2008.166     Document Type: Conference Paper
Times cited : (20)

References (13)
  • 3
    • 0042170255 scopus 로고    scopus 로고
    • Vulnerability assessment tools
    • July
    • Wales E., "Vulnerability assessment tools". Network Security. Vol 2003, Issue 7, pp. 15-17, July, 2003.
    • (2003) Network Security , vol.2003 , Issue.7 , pp. 15-17
    • Wales, E.1
  • 4
    • 33745170386 scopus 로고    scopus 로고
    • Quantitative Hierarchical Threat Evaluation Model for Network Security
    • April
    • CHEN Xiu-Zhen, ZHENG Qing-Hua, GUAN Xiao-Hong, LIN Chen-Guang, "Quantitative Hierarchical Threat Evaluation Model for Network Security", Journal of Software, Vol. 17, No. 4, April 2006, pp. 885-897
    • (2006) Journal of Software , vol.17 , Issue.4 , pp. 885-897
    • CHEN, X.-Z.1    ZHENG, Q.-H.2    GUAN, X.-H.3    Chen-Guang, L.I.N.4
  • 6
    • 62349095510 scopus 로고    scopus 로고
    • Douglas J. Landoll, THE SECURITY RISK ASSESSMENT HANDBOOK:A Complete Guide for Performing Security Risk Assessments, Published in 2006 by Auerbach Publications Taylor & Francis Group
    • Douglas J. Landoll, THE SECURITY RISK ASSESSMENT HANDBOOK:A Complete Guide for Performing Security Risk Assessments, Published in 2006 by Auerbach Publications Taylor & Francis Group
  • 7
    • 1842829828 scopus 로고    scopus 로고
    • Risk Management Guide for Information Technology Systems, National Institute of Standards and Technology
    • July
    • Gary Stoneburner, Alice Goguen, and Alexis Feringa, "Risk Management Guide for Information Technology Systems", National Institute of Standards and Technology, Special Publication 800-30, July 2002.
    • (2002) Special Publication , vol.800 -30
    • Stoneburner, G.1    Goguen, A.2    Feringa, A.3
  • 9
    • 0036083264 scopus 로고    scopus 로고
    • DeTreville, J., Binder, a logic-based security language, Security and Privacy, 2002. Proceedings. 2002 IEEE Symposium on, no., pp. 105-113, 2002
    • DeTreville, J., "Binder, a logic-based security language," Security and Privacy, 2002. Proceedings. 2002 IEEE Symposium on, vol., no., pp. 105-113, 2002
  • 10
    • 62349113056 scopus 로고    scopus 로고
    • Konstantinos Sagonas, Terrance Swift, David S. Warren, et al. The XSB System Manual:version 3.0 [EB/OL]. http://xsb.sourceforge.net. 2006.7.
    • Konstantinos Sagonas, Terrance Swift, David S. Warren, et al. "The XSB System Manual:version 3.0" [EB/OL]. http://xsb.sourceforge.net. 2006.7.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.