메뉴 건너뛰기




Volumn 9, Issue 4, 2012, Pages 482-493

A Learning-based approach to reactive security

Author keywords

adversarial learning; attack graphs; game theory.; online learning; Reactive security; risk management

Indexed keywords

GAME THEORY; NETWORK SECURITY; RISK MANAGEMENT;

EID: 84861164054     PISSN: 15455971     EISSN: None     Source Type: Journal    
DOI: 10.1109/TDSC.2011.42     Document Type: Article
Times cited : (17)

References (33)
  • 1
    • 77955317474 scopus 로고    scopus 로고
    • Key elements of an information security program
    • J.P. Pironti, "Key Elements of an Information Security Program," Information Systems Control J., vol. 1, 2005.
    • (2005) Information Systems Control J. , vol.1
    • Pironti, J.P.1
  • 3
    • 77955339808 scopus 로고    scopus 로고
    • Mar.
    • C. Beard, "Introducing Test Pilot," http://labs.mozilla.com/ 2008/03/introducing-test-pilot/, Mar. 2008.
    • (2008) Introducing Test Pilot
    • Beard, C.1
  • 4
    • 33750950152 scopus 로고    scopus 로고
    • Evaluating information security investments from attackers perspective: The Return-On-Attack (ROA)
    • M. Cremonini, "Evaluating Information Security Investments from Attackers Perspective: The Return-On-Attack (ROA)," Proc. Fourth Workshop the Economics of Information Security, 2005.
    • (2005) Proc. Fourth Workshop the Economics of Information Security
    • Cremonini, M.1
  • 6
    • 85071546401 scopus 로고    scopus 로고
    • July
    • D. Fisher, "Multi-Process Architecture," http://dev.chromium. org/developers/design-documents/multi-process-architecture, July 2008.
    • (2008) Multi-Process Architecture
    • Fisher, D.1
  • 9
    • 58849165586 scopus 로고    scopus 로고
    • Home pcs rented out in sabotage-for-hire racket
    • July
    • B. Warner, "Home PCs Rented Out in Sabotage-for-Hire Racket," Reuters, July 2004.
    • (2004) Reuters
    • Warner, B.1
  • 11
    • 77954317163 scopus 로고    scopus 로고
    • Attack surface: Mitigate security risks by minimizing the code you expose to untrusted users
    • Nov.
    • M. Howard, "Attack Surface: Mitigate Security Risks by Minimizing the Code You Expose to Untrusted Users," MSDN Magazine, http://msdn.microsoft.com/en-us/magazine/cc163882.aspx, Nov. 2004.
    • (2004) MSDN Magazine
    • Howard, M.1
  • 12
    • 14744276335 scopus 로고    scopus 로고
    • Is finding security holes a good idea?
    • DOI 10.1109/MSP.2005.17
    • E. Rescorla, "Is Finding Security Holes a Good Idea?," IEEE Security and Privacy, vol. 3, no. 1, pp. 14-19, Jan./Feb. 2005. (Pubitemid 40325577)
    • (2005) IEEE Security and Privacy , vol.3 , Issue.1 , pp. 14-19
    • Rescorla, E.1
  • 14
    • 0032208221 scopus 로고    scopus 로고
    • The cost of achieving the best portfolio in hindsight
    • E. Ordentlich and T.M. Cover, "The Cost of Achieving the Best Portfolio in Hindsight," Math. of Operations Research, vol. 23, no. 4, pp. 960-982, 1998. (Pubitemid 128508566)
    • (1998) Mathematics of Operations Research , vol.23 , Issue.4 , pp. 960-982
    • Ordentlich, E.1    Cover, T.M.2
  • 15
    • 0002267135 scopus 로고    scopus 로고
    • Adaptive game playing using multiplicative weights
    • Y. Freund and R.E. Schapire, "Adaptive Game Playing Using Multiplicative Weights," Games and Economic Behavior, vol. 29, pp. 79-103, 1999.
    • (1999) Games and Economic Behavior , vol.29 , pp. 79-103
    • Freund, Y.1    Schapire, R.E.2
  • 20
    • 0032137328 scopus 로고    scopus 로고
    • Tracking the best expert
    • DOI 10.1023/A:1007424614876
    • M. Herbster and M.K. Warmuth, "Tracking the Best Expert," Machine Learning, vol. 32, no. 2, pp. 151-178, 1998. (Pubitemid 40626079)
    • (1998) Machine Learning , vol.32 , Issue.2 , pp. 151-178
    • Herbster, M.1    Warmuth, M.K.2
  • 22
    • 0344792106 scopus 로고    scopus 로고
    • Managing online security risks
    • June 1
    • H.R. Varian, "Managing Online Security Risks," New York Times, June 1 2000.
    • (2000) New York Times
    • Varian, H.R.1
  • 23
    • 33750703619 scopus 로고    scopus 로고
    • Network software security and user incentives
    • DOI 10.1287/mnsc.1060.0568
    • T. August and T.I. Tunca, "Network Software Security and User Incentives," Management Science, vol. 52, no. 11, pp. 1703-1720, 2006. (Pubitemid 44706077)
    • (2006) Management Science , vol.52 , Issue.11 , pp. 1703-1720
    • August, T.1    Tunca, T.I.2
  • 24
  • 25
    • 33846138611 scopus 로고    scopus 로고
    • Returns to information security investment: The effect of alternative information security breach functions on optimal investment and sensitivity to vulnerability
    • DOI 10.1007/s10796-006-9011-6, Economic aspects of Information Security
    • K. Hausken, "Returns to Information Security Investment: The Effect of Alternative Information Security Breach Functions on Optimal Investment and Sensitivity to Vulnerability," Information Systems Frontiers, vol. 8, no. 5, pp. 338-349, 2006. (Pubitemid 46088508)
    • (2006) Information Systems Frontiers , vol.8 , Issue.5 , pp. 338-349
    • Hausken, K.1
  • 26
    • 33750482906 scopus 로고    scopus 로고
    • System reliability and free riding
    • H. Varian, "System Reliability and Free Riding," Economics of Information Security, vol. 12, pp. 1-16, 2001.
    • (2001) Economics of Information Security , vol.12 , pp. 1-16
    • Varian, H.1
  • 29
    • 38549087035 scopus 로고    scopus 로고
    • SecureRank: A risk-based vulnerability management scheme for computing infrastructures
    • DOI 10.1109/ICC.2007.244, 4288915, 2007 IEEE International Conference on Communications, ICC'07
    • R. Miura-Ko and N. Bambos, "SecureRank: A Risk-Based Vulnerability Management Scheme for Computing Infrastructures," Proc. IEEE Int'l Conf. Comm., pp. 1455-1460, June 2007. (Pubitemid 351145740)
    • (2007) IEEE International Conference on Communications , pp. 1455-1460
    • Ann Miura-Ko, R.1    Bambos, N.2
  • 32
    • 66549093519 scopus 로고    scopus 로고
    • Decision-theoretic and game-theoretic approaches to it security investment
    • H. Cavusoglu, S. Raghunathan, and W. Yue, "Decision-Theoretic and Game-Theoretic Approaches to IT Security Investment," J. Management Information Systems, vol. 25, no. 2, pp. 281-304, 2008.
    • (2008) J. Management Information Systems , vol.25 , Issue.2 , pp. 281-304
    • Cavusoglu, H.1    Raghunathan, S.2    Yue, W.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.