-
1
-
-
38949132578
-
-
K. Haslum, A. Arnes, "Multisensor Real-time Risk Assessment using Continuous-time Hidden Markov Models", Proceedings of International Conference on Computational Intelligence and Security, vol.2, Guangzhou, Guangdong, China, 3-6 Nov. 2006, pp. 1536-1540.
-
-
-
-
2
-
-
51049108373
-
-
Huisheng Gao, Jing Zhu, and Congcong Li, "The analysis of uncertainty of network security risk assessment using Dempster-Shafer theory", Proceedings of 12th International Conference on Computer Supported Cooperative Work in Design (CSCWD), Xian, Shanxi, China, 16-18 Apr. 2008, pp. 754-759.
-
-
-
-
3
-
-
79951500936
-
-
Hua Liu, "The Research and Application of the Risk Assessment Technology" [Master], National University of Defense Technology, Changsha, Hunan, China, Nov. 2005.
-
-
-
-
4
-
-
79951494832
-
-
Yingmei Wang, Shengkai Wang, Guoshun Chen, and Xiangyun Cheng, Information Security Risk Assessment, Publish House of Electronics Industry, Beijing, China, 2007.
-
-
-
-
5
-
-
79951470807
-
-
Karin Sallhammar, "Stochastic Models for Combined Security and Dependability Evaluation" [Ph.d], Norwegian University of Science and Technology, Trondheim, June 2007.
-
-
-
-
6
-
-
51849096703
-
-
P.F. Syverson, "A different look at secure distributed computation", Proceedings of the 10th Computer Security Foundations Workshop, The Institute of Electrical and Electronics Engineers, Inc., Rockport, Maui, Hawaii, USA, 10-12 June 1997, pp. 109-115.
-
-
-
-
7
-
-
79951470178
-
-
Samuel N. Hamilton, Wendy L. Miller, and Allen Ott, "The Role of Game Theory in Information Warfare", 4th Information survivability workshop (ISW-2001/2002), www.cyberdefenseagency.com
-
-
-
-
8
-
-
14344258545
-
-
Peng Liu, Wanyu Zang, "Incentive-Based Modeling and Inference of Attacker Intent, Objectives, and Strategies", Proceedings of the 10th ACM conference on Computer and Communications Security, ACM Press, Washington D.C., USA. 27-30 Oct. 2003, pp. 179-189.
-
-
-
-
9
-
-
14844293542
-
-
Kong-wei Lye, Jeannette M. Wing, "Game strategies in network security", International Journal of Information Security, Preface to the special issue of selected papers from FCS/VERIFY 2002, Vol. 4, Numbers 1-2, Springer Berlin / Heidelberg, Feb. 2005, pp. 71-86
-
-
-
-
10
-
-
85128535352
-
-
Tansu Alpcan, Tamer Basar, "A Game Theoretic Analysis of Intrusion Detection in Access Control Systems", 43rd IEEE Conference on Decision and Control(CDC), vol.2, Atlantis, Paradise Island, Bahamas, 14-17 Dec. 2004, pp. 1568-1573
-
-
-
-
11
-
-
85128573835
-
-
Tansu Alpcan, Tamer Basar, "A Game Theoretic Approach to Decision and Analysis in Network Intrusion Detection," Proceedings of the 42nd IEEE Conference on Decision and Control, vol.3, Maui, Hawaii, USA, 9-12 Dec. 2003, pp. 2595-2600.
-
-
-
-
12
-
-
15944395410
-
-
A. Patcha and J.-M. Park, "A Game Theoretic Approach to Modeling Intrusion Detection in Mobile Ad Hoc Networks," Information Assurance Workshop, 2004. Proceedings from the Fifth Annual IEEE SMC , 10-11 June 2004, pp. 280-284.
-
-
-
-
13
-
-
18844454790
-
-
A. Agah, S.K. Das, K. Basu and M. Asadi, "Intrusion Detection in Sensor Networks: A Non-cooperative Game Approach", Proceedings of the Third IEEE International Symposium on Network Computing and Applications (NCA'04), August- September 2004, pp. 343-346.
-
-
-
-
14
-
-
79951481989
-
-
Gary Stoneburner, Alice Goguen, and Alexis Feringa, "Risk Management Guide for Information Technology Systems", National Institute of Standards and Technology, Special Publication 800-30, July 2002.
-
-
-
-
15
-
-
84948965481
-
-
R. Ritchey, B. O'Berry, and S. Noel, "Representing TCP/IP Connectivity for Topological Analysis of Network Security", Proceedings of 18th Annual Computer Security Applications Conference, Las Vegas, Nevada , USA, 9-13 December 2002, pp. 25-31
-
-
-
-
16
-
-
79951494636
-
-
Wenke Lee, Wei Fan, Matthew Miller, Salvatore J. Stolfo, and Erez Zadok, "Toward Cost-Sensitive Modeling for Intrusion Detection and Response", North Carolina State University, 2000.
-
-
-
-
17
-
-
48349108542
-
-
Wei Jiang, Hongli Zhang, Zhihong Tian, and Xinfang Song, "A game Theoretic Method for Decision and Analysis of the Optimal Active Defense Strategy", Proceedings of 2007 International Conference on Computational Intelligence and Security(CIS), Harbin, Heilongjiang, China, 15-19 Dec. 2007, pp. 819-823
-
-
-
-
18
-
-
44449136625
-
-
Jin Shi, Yin Lu, and Li Xie, "Dynamic Intrusion Response Based on Game Theory", Journal of Computer Research and Development, The Institute of Computing Technology of the Chinese Academy of Sciences, Beijing, China, vol. 45, no. 5, May 2008, pp. 747-757.
-
-
-
-
19
-
-
79951503179
-
-
M J Osborne, A Rubinstein, R Aumann, et al, A Course in Game Theory, 2nd ed [M], The MIT Press, Cambridge, 1994
-
-
-
|