메뉴 건너뛰기




Volumn 8289 LNCS, Issue , 2013, Pages 319-332

Mitigating covert compromises: A game-theoretic model of targeted and non-targeted covert attacks

Author keywords

Computer Security; Covert Compromise; Game Theory; Non Targeted Attacks; Targeted Attacks

Indexed keywords

COMPUTING RESOURCE; COVERT COMPROMISE; GAME-THEORETIC MODEL; INCOMPLETE INFORMATION; MITIGATION STRATEGY; NON-TARGETED; OPTIMAL MITIGATION; TARGETED ATTACKS;

EID: 84893093420     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-45046-4_26     Document Type: Conference Paper
Times cited : (26)

References (19)
  • 1
  • 3
    • 84869448367 scopus 로고    scopus 로고
    • Defending against the unknown enemy: Applying FLIPIT to system security
    • Grossklags, J., Walrand, J. (eds.) GameSec 2012. Springer, Heidelberg
    • Bowers, K., van Dijk, M., Griffin, R., Juels, A., Oprea, A., Rivest, R., Triandopoulos, N.: Defending against the unknown enemy: Applying FLIPIT to system security. In: Grossklags, J., Walrand, J. (eds.) GameSec 2012. LNCS, vol. 7638, pp. 248-263. Springer, Heidelberg (2012)
    • (2012) LNCS , vol.7638 , pp. 248-263
    • Bowers, K.1    Van Dijk, M.2    Griffin, R.3    Juels, A.4    Oprea, A.5    Rivest, R.6    Triandopoulos, N.7
  • 4
    • 0037387448 scopus 로고    scopus 로고
    • Determining intent - Opportunistic vs. Targeted attacks
    • Casey, E.: Determining intent - Opportunistic vs. targeted attacks. Computer Fraud & Security 2003(4), 8-11 (2003)
    • (2003) Computer Fraud & Security , vol.2003 , Issue.4 , pp. 8-11
    • Casey, E.1
  • 8
    • 81755188455 scopus 로고    scopus 로고
    • Security games with market insurance
    • Baras, J.S., Katz, J., Altman, E. (eds.) GameSec 2011. Springer, Heidelberg
    • Johnson, B., Böhme, R., Grossklags, J.: Security games with market insurance. In: Baras, J.S., Katz, J., Altman, E. (eds.) GameSec 2011. LNCS, vol. 7037, pp. 117-130. Springer, Heidelberg (2011)
    • (2011) LNCS , vol.7037 , pp. 117-130
    • Johnson, B.1    Böhme, R.2    Grossklags, J.3
  • 9
    • 78049362316 scopus 로고    scopus 로고
    • Are security experts useful? Bayesian nash equilibria for network security games with limited information
    • Gritzalis, D., Preneel, B., Theoharidou, M. (eds.) ESORICS 2010. Springer, Heidelberg
    • Johnson, B., Grossklags, J., Christin, N., Chuang, J.: Are security experts useful? Bayesian nash equilibria for network security games with limited information. In: Gritzalis, D., Preneel, B., Theoharidou, M. (eds.) ESORICS 2010. LNCS, vol. 6345, pp. 588-606. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6345 , pp. 588-606
    • Johnson, B.1    Grossklags, J.2    Christin, N.3    Chuang, J.4
  • 10
    • 84893119947 scopus 로고    scopus 로고
    • Kaspersky Lab. Gauss (2012), http://www.kaspersky.com/gauss
    • (2012) Gauss
  • 11
    • 84910012094 scopus 로고    scopus 로고
    • Technical Report CRYSYS-TR-2012-11-15, CrySyS Lab, Budapest University of Technology and Economics November
    • Laszka, A., Felegyhazi, M., Buttyán, L.: A survey of interdependent security games. Technical Report CRYSYS-TR-2012-11-15, CrySyS Lab, Budapest University of Technology and Economics (November 2012)
    • (2012) A Survey of Interdependent Security Games
    • Laszka, A.1    Felegyhazi, M.2    Buttyán, L.3
  • 13
    • 84893138101 scopus 로고    scopus 로고
    • Mitigation of targeted and non-targeted covert attacks as a timing game
    • Laszka, A., Johnson, B., Grossklags, J.: Mitigation of targeted and non-targeted covert attacks as a timing game. In: Proc. of GameSec 2013 (2013)
    • (2013) Proc. Of GameSec 2013
    • Laszka, A.1    Johnson, B.2    Grossklags, J.3
  • 14
    • 84884766446 scopus 로고    scopus 로고
    • Managing the weakest link: A game-theoretic approach for the mitigation of insider threats
    • Crampton, J., Jajodia, S., Mayes, K. (eds.) ESORICS 2013. Springer, Heidelberg
    • Laszka, A., Johnson, B., Schöttle, P., Grossklags, J., Böhme, R.: Managing the weakest link: A game-theoretic approach for the mitigation of insider threats. In: Crampton, J., Jajodia, S., Mayes, K. (eds.) ESORICS 2013. LNCS, vol. 8134, pp. 273-290. Springer, Heidelberg (2013)
    • (2013) LNCS , vol.8134 , pp. 273-290
    • Laszka, A.1    Johnson, B.2    Schöttle, P.3    Grossklags, J.4    Böhme, R.5
  • 16
    • 84869444399 scopus 로고    scopus 로고
    • Are we compromised? Modelling security assessment games
    • Grossklags, J., Walrand, J. (eds.) GameSec 2012. Springer, Heidelberg
    • Pham, V., Cid, C.: Are we compromised? Modelling security assessment games. In: Grossklags, J., Walrand, J. (eds.) GameSec 2012. LNCS, vol. 7638, pp. 234-247. Springer, Heidelberg (2012)
    • (2012) LNCS , vol.7638 , pp. 234-247
    • Pham, V.1    Cid, C.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.