메뉴 건너뛰기




Volumn 7638 LNCS, Issue , 2012, Pages 234-247

Are we compromised? Modelling security assessment games

Author keywords

[No Author keywords available]

Indexed keywords

DIGITAL ASSETS; GAME-THEORETIC; INTEGRAL PART; IT INFRASTRUCTURES; SECURITY ASSESSMENT;

EID: 84869444399     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-34266-0_14     Document Type: Conference Paper
Times cited : (27)

References (15)
  • 3
    • 78650755197 scopus 로고    scopus 로고
    • Optimal Information Security Investment with Penetration Testing
    • Alpcan, T., Buttyán, L., Baras, J.S. (eds.) GameSec 2010. Springer, Heidelberg
    • Böhme, R., Félegyházi, M.: Optimal Information Security Investment with Penetration Testing. In: Alpcan, T., Buttyán, L., Baras, J.S. (eds.) GameSec 2010. LNCS, vol. 6442, pp. 21-37. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6442 , pp. 21-37
    • Böhme, R.1    Félegyházi, M.2
  • 9
    • 79957616447 scopus 로고    scopus 로고
    • Stuxnet: Dissecting a cyber warfare weapon
    • Langner, R.: Stuxnet: Dissecting a cyber warfare weapon. IEEE Security & Privacy 9(3), 49-51 (2011)
    • (2011) IEEE Security & Privacy , vol.9 , Issue.3 , pp. 49-51
    • Langner, R.1
  • 14
    • 84869474981 scopus 로고    scopus 로고
    • Flipit: The game of "stealthy takeover"
    • ePrint Archive, Report 2012/103
    • van Dijk, M., Juels, A., Oprea, A., Rivest, R.L.: Flipit: The game of "stealthy takeover". Cryptology ePrint Archive, Report 2012/103 (2012)
    • (2012) Cryptology
    • Van Dijk, M.1    Juels, A.2    Oprea, A.3    Rivest, R.L.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.