-
1
-
-
84894191142
-
The cousins of Stuxnet: Duqu, Flame, and Gauss
-
Bencsath, B., Pek, G., Buttyán, L., Felegyhazi, M.: The cousins of Stuxnet: Duqu, Flame, and Gauss. Future Internet 4(4), 971-1003 (2012)
-
(2012)
Future Internet
, vol.4
, Issue.4
, pp. 971-1003
-
-
Bencsath, B.1
Pek, G.2
Buttyán, L.3
Felegyhazi, M.4
-
3
-
-
84869448367
-
Defending against the unknown enemy: Applying FLIPIT to system security
-
Grossklags, J., Walrand, J. (eds.) GameSec 2012. Springer, Heidelberg
-
Bowers, K., van Dijk, M., Griffin, R., Juels, A., Oprea, A., Rivest, R., Triandopoulos, N.: Defending against the unknown enemy: Applying FLIPIT to system security. In: Grossklags, J., Walrand, J. (eds.) GameSec 2012. LNCS, vol. 7638, pp. 248-263. Springer, Heidelberg (2012)
-
(2012)
LNCS
, vol.7638
, pp. 248-263
-
-
Bowers, K.1
Van Dijk, M.2
Griffin, R.3
Juels, A.4
Oprea, A.5
Rivest, R.6
Triandopoulos, N.7
-
4
-
-
0037387448
-
Determining intent - Opportunistic vs. Targeted attacks
-
Casey, E.: Determining intent - Opportunistic vs. targeted attacks. Computer Fraud & Security 2003(4), 8-11 (2003)
-
(2003)
Computer Fraud & Security
, vol.2003
, Issue.4
, pp. 8-11
-
-
Casey, E.1
-
6
-
-
57349198694
-
Secure or insure? A game-theoretic analysis of information security games
-
Grossklags, J., Christin, N., Chuang, J.: Secure or insure? A game-theoretic analysis of information security games. In: Proc. of the 17th International World Wide Web Conference (WWW), pp. 209-218 (2008)
-
(2008)
Proc. Of the 17th International World Wide Web Conference (WWW)
, pp. 209-218
-
-
Grossklags, J.1
Christin, N.2
Chuang, J.3
-
8
-
-
81755188455
-
Security games with market insurance
-
Baras, J.S., Katz, J., Altman, E. (eds.) GameSec 2011. Springer, Heidelberg
-
Johnson, B., Böhme, R., Grossklags, J.: Security games with market insurance. In: Baras, J.S., Katz, J., Altman, E. (eds.) GameSec 2011. LNCS, vol. 7037, pp. 117-130. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.7037
, pp. 117-130
-
-
Johnson, B.1
Böhme, R.2
Grossklags, J.3
-
9
-
-
78049362316
-
Are security experts useful? Bayesian nash equilibria for network security games with limited information
-
Gritzalis, D., Preneel, B., Theoharidou, M. (eds.) ESORICS 2010. Springer, Heidelberg
-
Johnson, B., Grossklags, J., Christin, N., Chuang, J.: Are security experts useful? Bayesian nash equilibria for network security games with limited information. In: Gritzalis, D., Preneel, B., Theoharidou, M. (eds.) ESORICS 2010. LNCS, vol. 6345, pp. 588-606. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6345
, pp. 588-606
-
-
Johnson, B.1
Grossklags, J.2
Christin, N.3
Chuang, J.4
-
10
-
-
84893119947
-
-
Kaspersky Lab. Gauss (2012), http://www.kaspersky.com/gauss
-
(2012)
Gauss
-
-
-
11
-
-
84910012094
-
-
Technical Report CRYSYS-TR-2012-11-15, CrySyS Lab, Budapest University of Technology and Economics November
-
Laszka, A., Felegyhazi, M., Buttyán, L.: A survey of interdependent security games. Technical Report CRYSYS-TR-2012-11-15, CrySyS Lab, Budapest University of Technology and Economics (November 2012)
-
(2012)
A Survey of Interdependent Security Games
-
-
Laszka, A.1
Felegyhazi, M.2
Buttyán, L.3
-
12
-
-
84893079670
-
-
Technical report, Budapest University of Technology and Economics
-
Laszka, A., Horvath, G., Felegyhazi, M., Buttyan, L.: FlipThem: Modeling targeted attacks with FlipIt for multiple resources. Technical report, Budapest University of Technology and Economics (2013)
-
(2013)
FlipThem: Modeling Targeted Attacks with FlipIt for Multiple Resources
-
-
Laszka, A.1
Horvath, G.2
Felegyhazi, M.3
Buttyan, L.4
-
13
-
-
84893138101
-
Mitigation of targeted and non-targeted covert attacks as a timing game
-
Laszka, A., Johnson, B., Grossklags, J.: Mitigation of targeted and non-targeted covert attacks as a timing game. In: Proc. of GameSec 2013 (2013)
-
(2013)
Proc. Of GameSec 2013
-
-
Laszka, A.1
Johnson, B.2
Grossklags, J.3
-
14
-
-
84884766446
-
Managing the weakest link: A game-theoretic approach for the mitigation of insider threats
-
Crampton, J., Jajodia, S., Mayes, K. (eds.) ESORICS 2013. Springer, Heidelberg
-
Laszka, A., Johnson, B., Schöttle, P., Grossklags, J., Böhme, R.: Managing the weakest link: A game-theoretic approach for the mitigation of insider threats. In: Crampton, J., Jajodia, S., Mayes, K. (eds.) ESORICS 2013. LNCS, vol. 8134, pp. 273-290. Springer, Heidelberg (2013)
-
(2013)
LNCS
, vol.8134
, pp. 273-290
-
-
Laszka, A.1
Johnson, B.2
Schöttle, P.3
Grossklags, J.4
Böhme, R.5
-
16
-
-
84869444399
-
Are we compromised? Modelling security assessment games
-
Grossklags, J., Walrand, J. (eds.) GameSec 2012. Springer, Heidelberg
-
Pham, V., Cid, C.: Are we compromised? Modelling security assessment games. In: Grossklags, J., Walrand, J. (eds.) GameSec 2012. LNCS, vol. 7638, pp. 234-247. Springer, Heidelberg (2012)
-
(2012)
LNCS
, vol.7638
, pp. 234-247
-
-
Pham, V.1
Cid, C.2
-
17
-
-
84893048976
-
Results and problems in games of timing
-
Radzik, T.: Results and problems in games of timing. In: Statistics, Probability and Game Theory: Papers in Honor of David Blackwell. Lecture Notes-Monograph Series, Statistics, vol. 30, pp. 269-292 (1996)
-
(1996)
Statistics, Probability and Game Theory: Papers in Honor of David Blackwell. Lecture Notes-Monograph Series, Statistics
, vol.30
, pp. 269-292
-
-
Radzik, T.1
-
18
-
-
84893054072
-
Risk-seeking in a continuous game of timing
-
Reitter, D., Grossklags, J., Nochenson, A.: Risk-seeking in a continuous game of timing. In: Proc. of the 13th International Conference on Cognitive Modeling (ICCM), pp. 397-403 (2013)
-
(2013)
Proc. Of the 13th International Conference on Cognitive Modeling (ICCM)
, pp. 397-403
-
-
Reitter, D.1
Grossklags, J.2
Nochenson, A.3
-
19
-
-
84890434312
-
FlipIt: The game of "stealthy takeover"
-
van Dijk, M., Juels, A., Oprea, A., Rivest, R.: FlipIt: The game of "stealthy takeover". Journal of Cryptology 26, 655-713 (2013)
-
(2013)
Journal of Cryptology
, vol.26
, pp. 655-713
-
-
Van Dijk, M.1
Juels, A.2
Oprea, A.3
Rivest, R.4
|