메뉴 건너뛰기




Volumn , Issue , 2009, Pages

A game theoretic recommendation system for security alert dissemination

Author keywords

[No Author keywords available]

Indexed keywords

FUZZY SECURITY; INFORMATION FLOWS; INPUT PARAMETER; LOCAL INFORMATION; PROOF OF CONCEPT; RECOMMENDATION SYSTEMS; RESOURCE ALLOCATION STRATEGIES; RESOURCE LIMITATIONS; SECURITY ALERTS; SECURITY EXPERTS; SYSTEM ADMINISTRATORS; WEB APPLICATION; ZERO SUMS;

EID: 70449632950     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (1)

References (20)
  • 1
    • 70449684137 scopus 로고    scopus 로고
    • McAfee, Mcafee vulnerability manager, McAfee Data Sheet, 2008. [Online]. Available: http://www.mcafee.com/us/local content/datasheets/ds mcafee vulnerability manager.pdf
    • McAfee, "Mcafee vulnerability manager," McAfee Data Sheet, 2008. [Online]. Available: http://www.mcafee.com/us/local content/datasheets/ds mcafee vulnerability manager.pdf
  • 3
    • 61849136266 scopus 로고    scopus 로고
    • Stochastic models for combined security and dependability evaluation,
    • Ph.D. dissertation, Norwegian University of Science and Technology, Faculty of Information Technologgy, Mathematics and Electrical Engineering, Department of Telematics
    • K. Sallhammar, "Stochastic models for combined security and dependability evaluation," Ph.D. dissertation, Norwegian University of Science and Technology, Faculty of Information Technologgy, Mathematics and Electrical Engineering, Department of Telematics, 2007.
    • (2007)
    • Sallhammar, K.1
  • 7
    • 14344257107 scopus 로고    scopus 로고
    • A game theoretic analysis of intrusion detection in access control systems
    • Paradise Island, Bahamas, December
    • T. Alpcan and T. Başar, "A game theoretic analysis of intrusion detection in access control systems," in Proc. of 43rd IEEE Conf. Decision and Control, Paradise Island, Bahamas, December 2004, pp. 1568-1573.
    • (2004) Proc. of 43rd IEEE Conf. Decision and Control , pp. 1568-1573
    • Alpcan, T.1    Başar, T.2
  • 10
    • 33645779967 scopus 로고    scopus 로고
    • Regular patching cycles
    • March
    • P. Hunter, "Regular patching cycles," Computer Fraud and Security, no. 3, pp. 6-7, March 2006.
    • (2006) Computer Fraud and Security , Issue.3 , pp. 6-7
    • Hunter, P.1
  • 16
    • 0001372435 scopus 로고
    • Fuzzy linear programming models to solve fuzzy matrix games
    • L. Campos, "Fuzzy linear programming models to solve fuzzy matrix games," Fuzzy Sets Syst., vol. 32, no. 3, pp. 275-289, 1989.
    • (1989) Fuzzy Sets Syst , vol.32 , Issue.3 , pp. 275-289
    • Campos, L.1
  • 17
  • 18
    • 33745610810 scopus 로고    scopus 로고
    • Fuzzy alpha-cut vs. monte carlo techniques in assessing uncertainty in model parameters
    • Proc. of 4th Intl
    • A. Abebe, V. Guinot, and D. Solomatine, "Fuzzy alpha-cut vs. monte carlo techniques in assessing uncertainty in model parameters," in In Proc. of 4th Intl. Conf. on Hydroinformatics, Iowa City, USA, July 2000, 2000.
    • (2000) Conf. on Hydroinformatics, Iowa City, USA, July
    • Abebe, A.1    Guinot, V.2    Solomatine, D.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.