메뉴 건너뛰기




Volumn 6442 LNCS, Issue , 2010, Pages 234-244

Uncertainty in interdependent security games

Author keywords

[No Author keywords available]

Indexed keywords

BAYESIAN NASH EQUILIBRIA; COMMON KNOWLEDGE; INFORMATION SECURITY; RISK PARAMETER; SECURITY THREATS; SECURITY GAMES;

EID: 78650721633     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-17197-0_16     Document Type: Conference Paper
Times cited : (36)

References (25)
  • 1
    • 84995590301 scopus 로고    scopus 로고
    • What can behavioral economics teach us about privacy?
    • Acquisti, A., Gritzalis, S., Di Vimercati, S., Lambrinoudakis, C. (eds.) Auerbach Publications, Boca Raton
    • Acquisti, A., Grossklags, J.: What can behavioral economics teach us about privacy? In: Acquisti, A., Gritzalis, S., Di Vimercati, S., Lambrinoudakis, C. (eds.) Digital Privacy: Theory, Technologies, and Practices, pp. 363-380. Auerbach Publications, Boca Raton (2007)
    • (2007) Digital Privacy: Theory, Technologies, and Practices , pp. 363-380
    • Acquisti, A.1    Grossklags, J.2
  • 4
    • 0037599474 scopus 로고    scopus 로고
    • The economic cost of publicly announced information security breaches: Empirical evidence from the stock market
    • Campbell, K., Gordon, L., Loeb, M., Zhou, L.: The economic cost of publicly announced information security breaches: Empirical evidence from the stock market. Journal of Computer Security 11(3), 431-448 (2003)
    • (2003) Journal of Computer Security , vol.11 , Issue.3 , pp. 431-448
    • Campbell, K.1    Gordon, L.2    Loeb, M.3    Zhou, L.4
  • 7
    • 70350389209 scopus 로고    scopus 로고
    • Blue versus red: Towards a model of distributed security attacks
    • Dingledine, R., Golle, P. (eds.) FC 2009. Springer, Heidelberg
    • Fultz, N., Grossklags, J.: Blue versus red: Towards a model of distributed security attacks. In: Dingledine, R., Golle, P. (eds.) FC 2009. LNCS, vol. 5628, pp. 167-183. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5628 , pp. 167-183
    • Fultz, N.1    Grossklags, J.2
  • 8
    • 30344462995 scopus 로고    scopus 로고
    • The economic incentives for sharing security information
    • Gal-Or, E., Ghose, A.: The economic incentives for sharing security information. Information Systems Research 16(2), 186-208 (2005)
    • (2005) Information Systems Research , vol.16 , Issue.2 , pp. 186-208
    • Gal-Or, E.1    Ghose, A.2
  • 15
    • 78650732970 scopus 로고    scopus 로고
    • Technical report, Columbia Business School & The Wharton School January
    • Heal, G., Kunreuther, H.: The vaccination game. Technical report, Columbia Business School & The Wharton School (January 2005)
    • (2005) The Vaccination Game
    • Heal, G.1    Kunreuther, H.2
  • 16
    • 34848928398 scopus 로고    scopus 로고
    • Coordination of strategic responses to security threats: Laboratory evidence
    • Hess, R., Holt, C., Smith, A.: Coordination of strategic responses to security threats: Laboratory evidence. Experimental Economics 10(3), 235-250 (2007)
    • (2007) Experimental Economics , vol.10 , Issue.3 , pp. 235-250
    • Hess, R.1    Holt, C.2    Smith, A.3
  • 17
    • 84899006528 scopus 로고    scopus 로고
    • Algorithms for interdependent security games
    • Thrun, S., Saul, L., Schölkopf, B. (eds.) MIT Press, Cambridge
    • Kearns, M., Ortiz, L.: Algorithms for interdependent security games. In: Thrun, S., Saul, L., Schölkopf, B. (eds.) Advances in Neural Information Processing Systems, vol. 16, pp. 561-568. MIT Press, Cambridge (2004)
    • (2004) Advances in Neural Information Processing Systems , vol.16 , pp. 561-568
    • Kearns, M.1    Ortiz, L.2
  • 19
    • 61449258341 scopus 로고    scopus 로고
    • Detecting network-wide and router-specific misconfigurations through data mining
    • Le, F., Lee, S., Wong, T., Kim, H., Newcomb, D.: Detecting network-wide and router-specific misconfigurations through data mining. IEEE/ACM Trans. Netw. 17(1), 66-79 (2009)
    • (2009) IEEE/ACM Trans. Netw. , vol.17 , Issue.1 , pp. 66-79
    • Le, F.1    Lee, S.2    Wong, T.3    Kim, H.4    Newcomb, D.5
  • 24
    • 34547100991 scopus 로고    scopus 로고
    • An empirical analysis of the impact of software vulnerability announcements on firm stock price
    • Telang, R., Wattal, S.: An empirical analysis of the impact of software vulnerability announcements on firm stock price. IEEE Transactions on Software Engineering 33(8), 544-557 (2007)
    • (2007) IEEE Transactions on Software Engineering , vol.33 , Issue.8 , pp. 544-557
    • Telang, R.1    Wattal, S.2
  • 25
    • 33750482906 scopus 로고    scopus 로고
    • System reliability and free riding
    • Camp, L.J., Lewis, S. (eds.) Kluwer Academic Publishers, Dordrecht
    • Varian, H.R.: System reliability and free riding. In: Camp, L.J., Lewis, S. (eds.) Economics of Information Security. Advances in Information Security, vol. 12, pp. 1-15. Kluwer Academic Publishers, Dordrecht (2004)
    • (2004) Economics of Information Security. Advances in Information Security , vol.12 , pp. 1-15
    • Varian, H.R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.