메뉴 건너뛰기




Volumn , Issue , 2010, Pages

A survey of game theory as applied to network security

Author keywords

[No Author keywords available]

Indexed keywords

CYBER SECURITY; NETWORK DEFENSE; NETWORK SECURITY PROBLEMS; RESEARCH COMMUNITIES;

EID: 77951729734     PISSN: 15301605     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/HICSS.2010.35     Document Type: Conference Paper
Times cited : (414)

References (40)
  • 5
    • 33645411999 scopus 로고    scopus 로고
    • Dynamic programming and optimal control
    • 2nd ed. Belmont, MA
    • D. Bertsekas. Dynamic programming and optimal control. 2nd ed. Belmont, MA: Athena Scientific, vol. 2., 2001.
    • (2001) Athena Scientific , vol.2
    • Bertsekas, D.1
  • 7
    • 38349000956 scopus 로고    scopus 로고
    • A logical framework for evaluating network resilience against faults and attacks
    • E. Bursztein and J. Goubalt-Larrecq. A logical framework for evaluating network resilience against faults and attacks. Lecture Notes in Computer Science; Vol. 4846, 2007.
    • (2007) Lecture Notes in Computer Science , vol.4846
    • Bursztein, E.1    Goubalt-Larrecq, J.2
  • 9
    • 77951733671 scopus 로고    scopus 로고
    • Quantitative evaluation of risk for investment efficient strategies in cybersecurity: The queries methodology
    • L. Carin, G. Cybenko, and J. Hughes. Quantitative evaluation of risk for investment efficient strategies in cybersecurity: The queries methodology. IEEE Computer, 2008.
    • (2008) IEEE Computer
    • Carin, L.1    Cybenko, G.2    Hughes, J.3
  • 10
    • 0036871268 scopus 로고    scopus 로고
    • Internet infrastructure security: A taxonomy
    • November
    • A. Chakrabarti and G. Manimaran. Internet infrastructure security: A taxonomy. IEEE Network, 16:13, November 2002.
    • (2002) IEEE Network , vol.16 , pp. 13
    • Chakrabarti, A.1    Manimaran, G.2
  • 12
    • 33645766952 scopus 로고    scopus 로고
    • President's Information Technology Advisory Committee
    • President's Information Technology Advisory Committee, Cyber Security: A crisis of prioritization, 2005.
    • (2005) Cyber Security: A Crisis of Prioritization
  • 15
    • 77951722742 scopus 로고    scopus 로고
    • The Trusted Computing Group, http://www.trustedcomputinggroup.org.
  • 18
    • 15744370034 scopus 로고    scopus 로고
    • A taxonomy of network and computer attacks
    • February
    • S. Hansman and R. Hunt. A taxonomy of network and computer attacks. Computers and Security, 24:31-43, February 2005.
    • (2005) Computers and Security , vol.24 , pp. 31-43
    • Hansman, S.1    Hunt, R.2
  • 21
    • 33750374206 scopus 로고    scopus 로고
    • A taxonomy and comparison of computer security incidents from the commercial and government sectors
    • October
    • M. Kjaerland. A taxonomy and comparison of computer security incidents from the commercial and government sectors. Computers and Security, 25:522-538, October 2005.
    • (2005) Computers and Security , vol.25 , pp. 522-538
    • Kjaerland, M.1
  • 27
    • 11144272176 scopus 로고    scopus 로고
    • A taxonomy of ddos attack and ddos defense mechanisms
    • J. Mirkovic and P. Reiher. A taxonomy of ddos attack and ddos defense mechanisms. Computer Communication Review 34, no. 2, 2004.
    • (2004) Computer Communication Review , vol.34 , Issue.2
    • Mirkovic, J.1    Reiher, P.2
  • 33
    • 77951715218 scopus 로고    scopus 로고
    • U.S. Department of Homeland Security
    • U.S. Department of Homeland Security, https://buildsecurityin.us-cert. gov/daisy/bsi/home.html.
  • 35
    • 77951713289 scopus 로고    scopus 로고
    • Packet storm vulnerability database, http:// packetstormsecurity.org/, 2009.
    • (2009)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.