-
2
-
-
33947173819
-
-
Using stochastic game theory to compute the expected behavior of attackers. In Proceedings of the 2005 International Symposium on Applications and the Internet (Saint2005) Workshops
-
Sallhammar K, Knapskog SJ, Helvik BE. Using stochastic game theory to compute the expected behavior of attackers. In Proceedings of the 2005 International Symposium on Applications and the Internet (Saint2005) Workshops, 2005.
-
(2005)
-
-
Sallhammar, K.1
Knapskog, S.J.2
Helvik, B.E.3
-
3
-
-
33750944742
-
-
Towards a stochastic model for integrated security and dependability evaluation. In Proceedings of the First International Conference on Availability, Reliability and Security (ARES'06)
-
Sallhammar K, Helvik BE, Knapskog SJ. Towards a stochastic model for integrated security and dependability evaluation. In Proceedings of the First International Conference on Availability, Reliability and Security (ARES'06), 2006.
-
(2006)
-
-
Sallhammar, K.1
Helvik, B.E.2
Knapskog, S.J.3
-
4
-
-
85128564083
-
-
A game theoretic approach to decision and analysis in network intrusion detection. In Proceedings of the 42nd IEEE Conference on Decision and Control
-
Alpcan T, Basar T. A game theoretic approach to decision and analysis in network intrusion detection. In Proceedings of the 42nd IEEE Conference on Decision and Control, 2003.
-
(2003)
-
-
Alpcan, T.1
Basar, T.2
-
5
-
-
49249137544
-
-
A stochastic game theoretic approach to attack prediction and optimal active defense strategy decision. 2008 IEEE International Conference on Networking, Sensing and Control
-
Jiang W, Tian Z-h, Zhang H-l, Song X-f. A stochastic game theoretic approach to attack prediction and optimal active defense strategy decision. 2008 IEEE International Conference on Networking, Sensing and Control, 2008; 648-653.
-
(2008)
, pp. 648-653
-
-
Jiang, W.1
Z-h, T.2
H-l, Z.3
Song, X.-f.4
-
6
-
-
16644384919
-
Incentive-based modeling and inference of attacker intent, objectives, and strategies
-
Liu P, Zang W, Yu M. Incentive-based modeling and inference of attacker intent, objectives, and strategies. ACM Transactions on Information and System Security 2005; 8(1): 1-41.
-
(2005)
ACM Transactions on Information and System Security
, vol.8
, Issue.1
, pp. 1-41
-
-
Liu, P.1
Zang, W.2
Yu, M.3
-
7
-
-
84954449334
-
-
Defending against denial-of-service attacks with puzzle auctions. In Proceedings of IEEE Security and Privacy
-
Wang X, Reiter M. Defending against denial-of-service attacks with puzzle auctions. In Proceedings of IEEE Security and Privacy, 2003.
-
(2003)
-
-
Wang, X.1
Reiter, M.2
-
8
-
-
0037328484
-
Sustaining availability of web services under distributed denial of service attacks
-
Xu J, Lee W. Sustaining availability of web services under distributed denial of service attacks. IEEE Transactions on Computers 2003; 52(2): 195-208.
-
(2003)
IEEE Transactions on Computers
, vol.52
, Issue.2
, pp. 195-208
-
-
Xu, J.1
Lee, W.2
-
9
-
-
84863052490
-
-
Modeling and analysis of email worm propagation based on stochastic game nets. PDCAT 2011, 8
-
Yu M, Wang Y, Liu L, Cheng X. Modeling and analysis of email worm propagation based on stochastic game nets. PDCAT 2011, 2011.8
-
(2011)
-
-
Yu, M.1
Wang, Y.2
Liu, L.3
Cheng, X.4
-
11
-
-
0033325475
-
Experimenting with quantitative evaluation tools for monitoring operational security
-
Ortalo R, Deswarte Y. Experimenting with quantitative evaluation tools for monitoring operational security. IEEE Transactions on Software Engineering 1999; 25(5):633-650.
-
(1999)
IEEE Transactions on Software Engineering
, vol.25
, Issue.5
, pp. 633-650
-
-
Ortalo, R.1
Deswarte, Y.2
-
12
-
-
0036926468
-
-
Modeling and quantification of security attributes of software systems. In Proceedings of the International Conference on Dependable Systems and Networks (DSN'02)
-
Madan BB, Vaidyanathan K, Trivedi KS. Modeling and quantification of security attributes of software systems. In Proceedings of the International Conference on Dependable Systems and Networks (DSN'02), 2002.
-
(2002)
-
-
Madan, B.B.1
Vaidyanathan, K.2
Trivedi, K.S.3
-
13
-
-
60449090394
-
On stochastic modeling for integrated security and dependability evaluation
-
Sallhammar K, Helvik BE, Knapskog SJ. On stochastic modeling for integrated security and dependability evaluation. The Journal of Networks 2006; 1(5):31-42.
-
(2006)
The Journal of Networks
, vol.1
, Issue.5
, pp. 31-42
-
-
Sallhammar, K.1
Helvik, B.E.2
Knapskog, S.J.3
-
14
-
-
84871706470
-
-
Using game theory in stochastic models for quantifying security. In Proceedings of the 9th Nordic Workshop on Secure IT-systems.
-
Sallhammar K, Knapskog SJ. Using game theory in stochastic models for quantifying security. In Proceedings of the 9th Nordic Workshop on Secure IT-systems. 2004.
-
(2004)
-
-
Sallhammar, K.1
Knapskog, S.J.2
-
15
-
-
84856235065
-
Stochastic game net and applications in security analysis for enterprise network
-
doi:10.1007/s10207-011-0148-z.
-
Wang Y, Yu M, Li J, Meng K, Lin C, Cheng X. Stochastic game net and applications in security analysis for enterprise network. International Journal of Information Security 2011:1-12. doi:10.1007/s10207-011-0148-z.
-
(2011)
International Journal of Information Security
, pp. 1-12
-
-
Wang, Y.1
Yu, M.2
Li, J.3
Meng, K.4
Lin, C.5
Cheng, X.6
-
16
-
-
70449491179
-
-
Security analysis of enterprise network based on stochastic game nets model. ICC'09 Communication and Information Systems Security Symposium
-
Wang Y, Lin C, Wang Y, Meng K. Security analysis of enterprise network based on stochastic game nets model. ICC'09 Communication and Information Systems Security Symposium 2009.
-
(2009)
-
-
Wang, Y.1
Lin, C.2
Wang, Y.3
Meng, K.4
-
17
-
-
77951603423
-
-
Security analysis for online banking system using hierarchical stochastic game nets model. IEEE Global Communications Conference
-
Wang Y, Lin C, Meng K. Security analysis for online banking system using hierarchical stochastic game nets model. IEEE Global Communications Conference 2009.
-
(2009)
-
-
Wang, Y.1
Lin, C.2
Meng, K.3
-
18
-
-
78651569852
-
Analysis of attack actions for e-commerce based on stochastic game nets model
-
Wang Y, Lin C, Meng K, Lv J. Analysis of attack actions for e-commerce based on stochastic game nets model. Journal of computers 2009; 4(6):461-467.
-
(2009)
Journal of computers
, vol.4
, Issue.6
, pp. 461-467
-
-
Wang, Y.1
Lin, C.2
Meng, K.3
Lv, J.4
-
20
-
-
0000392613
-
-
Stochastic games. Proceedings of the National Academy of Science USA
-
Shapley LS. Stochastic games. Proceedings of the National Academy of Science USA, vol. 39, 1953; 1095-1100.
-
(1953)
, vol.39
, pp. 1095-1100
-
-
Shapley, L.S.1
-
21
-
-
0024908784
-
-
SPNP: Stochastic Petri Net Package. In Proc. Petri Nets and Performance Models
-
Ciaodo G, Muppala J, Trivedi KS. SPNP: Stochastic Petri Net Package. In Proc. Petri Nets and Performance Models, 1989; 142-151.
-
(1989)
, pp. 142-151
-
-
Ciaodo, G.1
Muppala, J.2
Trivedi, K.S.3
|