-
4
-
-
78650718541
-
A game-theoretical approach for finding optimal strategies in a botnet defense model
-
Alpcan, T., Buttyán, L., Baras, J.S. (eds.) GameSec 2010. Springer, Heidelberg
-
Bensoussan, A., Kantarcioglu, M., Hoe, S.R.: A game-theoretical approach for finding optimal strategies in a botnet defense model. In: Alpcan, T., Buttyán, L., Baras, J.S. (eds.) GameSec 2010. LNCS, vol. 6442, pp. 135-148. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6442
, pp. 135-148
-
-
Bensoussan, A.1
Kantarcioglu, M.2
Hoe, S.R.3
-
5
-
-
14944367812
-
Worm vs. Worm: Preliminary study of an active counter-attack mechanism
-
Castaneda, F., Sezer, E., Xu, J.: Worm vs. worm: preliminary study of an active counter-attack mechanism. In: Proc. ACM WORM 2004, pp. 83-93 (2004)
-
(2004)
Proc. ACM WORM 2004
, pp. 83-93
-
-
Castaneda, F.1
Sezer, E.2
Xu, J.3
-
6
-
-
39349087037
-
Epidemic thresholds in real networks
-
Chakrabarti, D., Wang, Y., Wang, C., Leskovec, J., Faloutsos, C.: Epidemic thresholds in real networks. ACM Trans. Inf. Syst. Secur. 10(4), 1-26 (2008)
-
(2008)
ACM Trans. Inf. Syst. Secur.
, vol.10
, Issue.4
, pp. 1-26
-
-
Chakrabarti, D.1
Wang, Y.2
Wang, C.3
Leskovec, J.4
Faloutsos, C.5
-
7
-
-
84869409808
-
A cost-based mechanism for evaluating the effectiveness of moving target defenses
-
Grossklags, J., Walrand, J. (eds.) GameSec 2012. Springer, Heidelberg
-
Collins, M.: A cost-based mechanism for evaluating the effectiveness of moving target defenses. In: Grossklags, J., Walrand, J. (eds.) GameSec 2012. LNCS, vol. 7638, pp. 221-233. Springer, Heidelberg (2012)
-
(2012)
LNCS
, vol.7638
, pp. 221-233
-
-
Collins, M.1
-
8
-
-
70350389209
-
Blue versus Red: Towards a Model of Distributed Security Attacks
-
Dingledine, R., Golle, P. (eds.) FC 2009. Springer, Heidelberg
-
Fultz, N., Grossklags, J.: Blue versus Red: Towards a Model of Distributed Security Attacks. In: Dingledine, R., Golle, P. (eds.) FC 2009. LNCS, vol. 5628, pp. 167-183. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5628
, pp. 167-183
-
-
Fultz, N.1
Grossklags, J.2
-
12
-
-
0000998185
-
A contribution to the mathematical theory of epidemics
-
Kermack, W., McKendrick, A.: A contribution to the mathematical theory of epidemics. Proc. of Roy. Soc. Lond. A 115, 700-721 (1927)
-
(1927)
Proc. of Roy. Soc. Lond. A
, vol.115
, pp. 700-721
-
-
Kermack, W.1
McKendrick, A.2
-
14
-
-
79960870809
-
A dynamic game solution to malware attack
-
Khouzani, M., Sarkar, S., Altman, E.: A dynamic game solution to malware attack. In: Proc. IEEE INFOCOM, pp. 2138-2146 (2011)
-
(2011)
Proc. IEEE INFOCOM
, pp. 2138-2146
-
-
Khouzani, M.1
Sarkar, S.2
Altman, E.3
-
15
-
-
84855430196
-
Saddle-point strategies in malware attack
-
Khouzani, M., Sarkar, S., Altman, E.: Saddle-point strategies in malware attack. IEEE Journal on Selected Areas in Communications 30(1), 31-43 (2012)
-
(2012)
IEEE Journal on Selected Areas in Communications
, vol.30
, Issue.1
, pp. 31-43
-
-
Khouzani, M.1
Sarkar, S.2
Altman, E.3
-
16
-
-
70349325889
-
Lifting the veil on cyber offense
-
Lin, H.: Lifting the veil on cyber offense. IEEE Security & Privacy 7(4), 15-21 (2009)
-
(2009)
IEEE Security & Privacy
, vol.7
, Issue.4
, pp. 15-21
-
-
Lin, H.1
-
17
-
-
84893156993
-
Game theory meets network security and privacy
-
to appear
-
Manshaei, M., Zhu, Q., Alpcan, T., Basar, T., Hubaux, J.: Game theory meets network security and privacy. In: ACM Computing Survey (to appear)
-
ACM Computing Survey
-
-
Manshaei, M.1
Zhu, Q.2
Alpcan, T.3
Basar, T.4
Hubaux, J.5
-
19
-
-
84860215339
-
Applications of mathematics to medical problems
-
McKendrick, A.: Applications of mathematics to medical problems. Proc. of Edin. Math. Soceity 14, 98-130 (1926)
-
(1926)
Proc. of Edin. Math. Soceity
, vol.14
, pp. 98-130
-
-
McKendrick, A.1
-
20
-
-
81455139102
-
-
August 19
-
Naraine, R.: 'friendly' welchia worm wreaking havoc (August 19, 2003), http://www.internetnews.com/ent-news/article.php/3065761/Friendly-Welchia-Worm- Wreaking-Havoc.htm
-
(2003)
'Friendly' Welchia Worm Wreaking Havoc
-
-
Naraine, R.1
-
21
-
-
67650416963
-
Protecting against network infections: A game theoretic perspective
-
Omic, J., Orda, A., Van Mieghem, P.: Protecting against network infections: A game theoretic perspective. In: Infocom 2009, pp. 1485-1493 (2009)
-
(2009)
Infocom 2009
, pp. 1485-1493
-
-
Omic, J.1
Orda, A.2
Van Mieghem, P.3
-
22
-
-
84869458985
-
Game theoretic model of strategic honeypot selection in computer networks
-
Grossklags, J., Walrand, J. (eds.) GameSec 2012. Springer, Heidelberg
-
Píbil, R., Lisý, V., Kiekintveld, C., Boš anský, B., Pěchouček, M.: Game theoretic model of strategic honeypot selection in computer networks. In: Grossklags, J., Walrand, J. (eds.) GameSec 2012. LNCS, vol. 7638, pp. 201-220. Springer, Heidelberg (2012)
-
(2012)
LNCS
, vol.7638
, pp. 201-220
-
-
Píbil, R.1
Lisý, V.2
Kiekintveld, C.3
Bošanský, B.4
Pěchouček, M.5
-
23
-
-
84893354825
-
-
February 19
-
Schneier, B.: Benevolent worms (February 19, 2008), http://www.schneier. com/blog/archives/2008/02/benevolent-worm-1.html
-
(2008)
Benevolent Worms
-
-
Schneier, B.1
-
25
-
-
84873813961
-
Selfish response to epidemic propagation
-
Theodorakopoulos, G., Boudec, J.-Y.L., Baras, J.S.: Selfish response to epidemic propagation. IEEE Trans. Aut. Contr. 58(2), 363-376 (2013)
-
(2013)
IEEE Trans. Aut. Contr.
, vol.58
, Issue.2
, pp. 363-376
-
-
Theodorakopoulos, G.1
Boudec, J.-Y.L.2
Baras, J.S.3
-
26
-
-
61449222889
-
Virus spread in networks
-
Van Mieghem, P., Omic, J., Kooij, R.: Virus spread in networks. IEEE/ACM Trans. Netw. 17(1), 1-14 (2009)
-
(2009)
IEEE/ACM Trans. Netw.
, vol.17
, Issue.1
, pp. 1-14
-
-
Van Mieghem, P.1
Omic, J.2
Kooij, R.3
-
27
-
-
54549088710
-
On the race of worms, alerts, and patches
-
Vojnovic, M., Ganesh, A.: On the race of worms, alerts, and patches. IEEE/ACM Trans. Netw. 16, 1066-1079 (2008)
-
(2008)
IEEE/ACM Trans. Netw.
, vol.16
, pp. 1066-1079
-
-
Vojnovic, M.1
Ganesh, A.2
-
28
-
-
27644462218
-
Epidemic spreading in real networks: An eigenvalue viewpoint
-
Wang, Y., Chakrabarti, D., Wang, C., Faloutsos, C.: Epidemic spreading in real networks: An eigenvalue viewpoint. In: Proc. IEEE SRDS 2003, pp. 25-34 (2003)
-
(2003)
Proc. IEEE SRDS 2003
, pp. 25-34
-
-
Wang, Y.1
Chakrabarti, D.2
Wang, C.3
Faloutsos, C.4
-
32
-
-
84870184308
-
Push- and pull-based epidemic spreading in arbitrary networks: Thresholds and deeper insights
-
Xu, S., Lu, W., Xu, L.: Push- and pull-based epidemic spreading in arbitrary networks: Thresholds and deeper insights. ACM Transactions on Autonomous and Adaptive Systems (ACM TAAS) 7(3), 32:1-32:26 (2012)
-
(2012)
ACM Transactions on Autonomous and Adaptive Systems (ACM TAAS)
, vol.7
, Issue.3
-
-
Xu, S.1
Lu, W.2
Xu, L.3
-
33
-
-
84893405083
-
Adaptive epidemic dynamics in networks: Thresholds and control
-
to appear
-
Xu, S., Lu, W., Xu, L., Zhan, Z.: Adaptive epidemic dynamics in networks: Thresholds and control. ACM Transactions on Autonomous and Adaptive Systems (ACM TAAS) (to appear)
-
ACM Transactions on Autonomous and Adaptive Systems (ACM TAAS)
-
-
Xu, S.1
Lu, W.2
Xu, L.3
Zhan, Z.4
-
34
-
-
81455143718
-
A stochastic model of multivirus dynamics
-
Xu, S., Lu, W., Zhan, Z.: A stochastic model of multivirus dynamics. IEEE Trans. Dependable Sec. Comput. 9(1), 30-45 (2012)
-
(2012)
IEEE Trans. Dependable Sec. Comput.
, vol.9
, Issue.1
, pp. 30-45
-
-
Xu, S.1
Lu, W.2
Zhan, Z.3
-
35
-
-
84893355933
-
A stochastic model of active cyber defense dynamics
-
to appear
-
Xu, S., Lu, W., Li, H.: A stochastic model of active cyber defense dynamics. Internet Mathematics (to appear)
-
Internet Mathematics
-
-
Xu, S.1
Lu, W.2
Li, H.3
|