메뉴 건너뛰기




Volumn 7638 LNCS, Issue , 2012, Pages 186-200

A game-theoretic framework for network security vulnerability assessment and mitigation

Author keywords

[No Author keywords available]

Indexed keywords

FLOW-LEVEL; GAME-THEORETIC; NASH EQUILIBRIA; NETWORK FLOWS; NUMERICAL INVESTIGATIONS; OPTIMAL OPERATING POINT; PARETO-OPTIMAL; PARETO-OPTIMAL FRONTIERS; SECURITY VULNERABILITIES; SECURITY VULNERABILITY ASSESSMENTS; SUPPLY-DEMAND;

EID: 84869389656     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-34266-0_11     Document Type: Conference Paper
Times cited : (17)

References (13)
  • 4
    • 84990029315 scopus 로고    scopus 로고
    • The Economics of Information Security Investment
    • Gordon, L.A., Loeb, M.P.: The Economics of Information Security Investment. ACM Trans. Inf. Syst. Secur. 5(4), 438-457 (2002)
    • (2002) ACM Trans. Inf. Syst. Secur. , vol.5 , Issue.4 , pp. 438-457
    • Gordon, L.A.1    Loeb, M.P.2
  • 5
    • 84856121120 scopus 로고    scopus 로고
    • PhD dissertation, University of California, Berkeley, Electrical Engineering and Computer Sciences March
    • Gueye, A.: A Game Theoretical Approach to Communication Security. PhD dissertation, University of California, Berkeley, Electrical Engineering and Computer Sciences (March 2011)
    • (2011) A Game Theoretical Approach to Communication Security
    • Gueye, A.1
  • 6
    • 84870631707 scopus 로고    scopus 로고
    • A Polyhedral-Based Analysis of Nash Equilibrium of Quasi-Zero-Sum Games and its Applications to Communication Network Security
    • submitted
    • Gueye, A., Lazska, A., Walrand, J., Anantharam, V.: A Polyhedral-Based Analysis of Nash Equilibrium of Quasi-Zero-Sum Games and its Applications to Communication Network Security. Symmetry - Special Issue: Polyhedra (submitted)
    • Symmetry - Special Issue: Polyhedra
    • Gueye, A.1    Lazska, A.2    Walrand, J.3    Anantharam, V.4
  • 8
    • 78650750523 scopus 로고    scopus 로고
    • Design of Network Topology in an Adversarial Environment
    • Alpcan, T., Buttyán, L., Baras, J.S. (eds.) GameSec 2010. Springer, Heidelberg
    • Gueye, A., Walrand, J.C., Anantharam, V.: Design of Network Topology in an Adversarial Environment. In: Alpcan, T., Buttyán, L., Baras, J.S. (eds.) GameSec 2010. LNCS, vol. 6442, pp. 1-20. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6442 , pp. 1-20
    • Gueye, A.1    Walrand, J.C.2    Anantharam, V.3
  • 11
    • 51049107864 scopus 로고    scopus 로고
    • A Complete Guide to the Common Vulnerability Scoring System
    • National Institute of Standards and Technology June
    • Mell, P., Scarfone, K., Romanosky, S.: A Complete Guide to the Common Vulnerability Scoring System. In: NIST CVSS. National Institute of Standards and Technology (June 2007)
    • (2007) NIST CVSS
    • Mell, P.1    Scarfone, K.2    Romanosky, S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.