-
3
-
-
28444441975
-
An analysis approach for multi-stage network attacks
-
Ying-Mei Wang, Zeng-Liang Liu, Xiang-Yun Cheng and Ke-Jun Zhang, "An analysis approach for multi-stage network attacks", Machine Learning and Cybernetics, Vol. 7, pp. 394-3954, 2005.
-
(2005)
Machine Learning and Cybernetics
, vol.7
, pp. 394-3954
-
-
Wang, Y.-M.1
Liu, Z.-L.2
Cheng, X.-Y.3
Zhang, K.-J.4
-
5
-
-
1642529483
-
A kind of network security behavior model based on game theory
-
Xia Zheng You and Zhang Shiyong, "A kind of network security behavior model based on game theory," Parallel and Distributed Computing, pp. 27-29, 2003
-
(2003)
Parallel and Distributed Computing
, pp. 27-29
-
-
Xia, Z.1
Zhang, S.2
-
7
-
-
17144375626
-
A non-cooperative game approach for intrusion detection in sensor networks
-
Agah, A., Das, S.K. and Basu, K., "A non-cooperative game approach for intrusion detection in sensor networks," Vehicular Technology Conference, Vol. 4, pp. 2902-2906, 2004
-
(2004)
Vehicular Technology Conference
, vol.4
, pp. 2902-2906
-
-
Agah, A.1
Das, S.K.2
Basu, K.3
-
9
-
-
72849150245
-
-
http://en.wikipedia.org/wiki/Minimax
-
-
-
-
10
-
-
1642529483
-
A Kind of network security behavior model Based on game theory
-
Xia Zheng You and Zhang Shiyong, "A Kind of network security behavior model Based on game theory," Proceedings of the Fourth International Conference on Parallel and Distributed Computing, Applications and Technologies, 2003. PDCAT'2003, pp. 950-954
-
(2003)
Proceedings of the Fourth International Conference on Parallel and Distributed Computing, Applications and Technologies, 2003. PDCAT
, pp. 950-954
-
-
Xia, Z.1
Zhang, S.2
-
11
-
-
72849150502
-
Game Theory
-
second edition, New York London
-
Guillermo Owen, Game Theory, second edition Academic press, 1982 New York London
-
(1982)
Academic press
-
-
Owen, G.1
-
14
-
-
0004020261
-
Introduction to Operations Research
-
McGraw-Hill
-
Hillier, S. and Lieberman, J., "Introduction to Operations Research," Engineering, McGraw-Hill, 2002.
-
(2002)
Engineering
-
-
Hillier, S.1
Lieberman, J.2
-
16
-
-
0036083194
-
Automated Generation and Analysis of Attack Graphs
-
Sheyner, O., Haines, J., Jha, S., Lippmann, R. and Wing, J.M., "Automated Generation and Analysis of Attack Graphs" Security and Privacy, pp.273-284, 2002.
-
(2002)
Security and Privacy
, pp. 273-284
-
-
Sheyner, O.1
Haines, J.2
Jha, S.3
Lippmann, R.4
Wing, J.M.5
-
17
-
-
1542288809
-
A Game Theoretic Approach to Decision and Analysisin Network Intrusion Detection
-
Alpcan, T. and Basar, T., "A Game Theoretic Approach to Decision and Analysisin Network Intrusion Detection," Decision and Control, Vol. 3, pp.2595-2600, 2003.
-
(2003)
Decision and Control
, vol.3
, pp. 2595-2600
-
-
Alpcan, T.1
Basar, T.2
-
18
-
-
0034446056
-
C4I defensive infrastructure for sur-vivability against multi-mode attacks
-
Browne, R., "C4I defensive infrastructure for sur-vivability against multi-mode attacks," MILCOM, Vol. 1, pp. 417-424, 2000.
-
(2000)
MILCOM
, vol.1
, pp. 417-424
-
-
Browne, R.1
-
19
-
-
84860434875
-
A structural framework for modeling multi-stage network attacks
-
Daley K., Larson, R. and Dawkins, J. "A structural framework for modeling multi-stage network attacks," Proceedings of International Conference on Parallel Processing Workshop, pp. 5-10, 2002.
-
(2002)
Proceedings of International Conference on Parallel Processing Workshop
, pp. 5-10
-
-
Daley, K.1
Larson, R.2
Dawkins, J.3
-
20
-
-
2642540118
-
Modeling Internet Attacks
-
Tidwell, T., Larson, R., Fitch, K. and Hale, J., "Modeling Internet Attacks," In Proceedings of the 2001 IEEE Workshop on Information Assurance and Security, pp. 54-59, 2001.
-
(2001)
Proceedings of the 2001 IEEE Workshop on Information Assurance and Security
, pp. 54-59
-
-
Tidwell, T.1
Larson, R.2
Fitch, K.3
Hale, J.4
-
22
-
-
62349090762
-
A Network Security Risk Assessment Framework Based on Game Theory
-
Wei He, Chunhe Xia, Cheng Zhang, Yi Ji and Xinyi Ma, "A Network Security Risk Assessment Framework Based on Game Theory," Second International Conference on Future Generation Communication and Networking, Volume: 2, pp. 249-253, 2008.
-
(2008)
Second International Conference on Future Generation Communication and Networking
, vol.2
, pp. 249-253
-
-
He, W.1
Xia, C.2
Zhang, C.3
Ji, Y.4
Ma, X.5
-
24
-
-
72849147273
-
Computer network security as a stochastic non-zero-sum Game strategies in network security
-
Int. Journal Inf. Security
-
K. Lye and J. Wing, "Computer network security as a stochastic non-zero-sum Game strategies in network security," Int. Journal Inf. Security 2005.
-
(2005)
-
-
Lye, K.1
Wing, J.2
|