메뉴 건너뛰기




Volumn 47, Issue 2, 2013, Pages

A survey of interdependent information security games

Author keywords

Externality; Interdependent security; Security economics; Security games

Indexed keywords

ECONOMICS; GAME THEORY; INFORMATION USE; SECURITY OF DATA; SURVEYS;

EID: 84907442807     PISSN: 03600300     EISSN: 15577341     Source Type: Journal    
DOI: 10.1145/2635673     Document Type: Review
Times cited : (121)

References (62)
  • 1
    • 85005305538 scopus 로고
    • Themarket for "lemons": Quality uncertainty and the market mechanism
    • Aug
    • G. A. Akerlof. 1970. Themarket for "lemons": Quality uncertainty and the market mechanism. The Quarterly Journal of Economics 84, 3 (Aug. 1970), 488-500.
    • (1970) The Quarterly Journal of Economics , vol.84 , Issue.3 , pp. 488-500
    • Akerlof, G.A.1
  • 3
    • 84871258626 scopus 로고    scopus 로고
    • Security of interdependent and identical Networked Control Systems
    • 2012
    • S. Amin, G. A. Schwartz, and S. S. Sastry. 2012. Security of interdependent and identical Networked Control Systems. Automatica 42, 1 (2012), 186-192.
    • (2012) Automatica , vol.42 , Issue.1 , pp. 186-192
    • Amin, S.1    Schwartz, G.A.2    Sastry, S.S.3
  • 5
    • 33750440197 scopus 로고    scopus 로고
    • The economics of information security
    • Oct
    • R. Anderson and T. Moore. 2006. The economics of information security. Science 314, 5799 (Oct. 2006), 610-613.
    • (2006) Science , vol.314 , Issue.5799 , pp. 610-613
    • Anderson, R.1    Moore, T.2
  • 7
    • 33746689683 scopus 로고    scopus 로고
    • 2006. Inoculation strategies for victims of viruses and the sum-ofsquares partition problem
    • Sept
    • J. Aspnes, K. Chang, and A. Yampolskiy. 2006. Inoculation strategies for victims of viruses and the sum-ofsquares partition problem. Journal of Computing System Science 72, 6 (Sept. 2006), 1077-1093.
    • (2006) Journal of Computing System Science , vol.72 , Issue.6 , pp. 1077-1093
    • Aspnes, J.1    Chang, K.2    Yampolskiy, A.3
  • 15
    • 84905827579 scopus 로고    scopus 로고
    • Defence Signals Directorate.,Retrieved from
    • Defence Signals Directorate. 2012. Top 35 Mitigation Strategies. Retrieved from infosec/top35mitigationstrategies.http://www.dsd.gov.au/infosec/top35mitigationstrategies.htm.
    • (2012) Top 35 Mitigation Strategies
  • 20
    • 84990029315 scopus 로고    scopus 로고
    • The economics of information security investment
    • Nov 2002
    • L. A. Gordon and M. P. Loeb. 2002. The economics of information security investment. ACM Transactions on Information and System Security 5, 4 (Nov. 2002), 438-457. DOI:http://dx.doi.org/10.1145/581271.581274
    • (2002) ACM Transactions on Information and System Security , vol.5 , Issue.4 , pp. 438-457
    • Gordon, L.A.1    Loeb, M.P.2
  • 21
    • 0344899914 scopus 로고    scopus 로고
    • Sharing information on computer systems security: An economic analysis
    • L. A. Gordon, M. P. Loeb, and W. Lucyshyn. 2003. Sharing information on computer systems security: An economic analysis. Journal of Accounting and Public Policy 22, 6 (2003), 461-485.
    • (2003) Journal of Accounting and Public Policy , vol.22 , Issue.6 , pp. 461-485
    • Gordon, L.A.1    Loeb, M.P.2    Lucyshyn, W.3
  • 23
  • 25
    • 33751256271 scopus 로고    scopus 로고
    • Income, interdependence, and substitution effects affecting incentives for security investment
    • K. Hausken. 2006. Income, interdependence, and substitution effects affecting incentives for security investment. Journal of Accounting and Public Policy 25, 6 (2006), 629-665.
    • (2006) Journal of Accounting and Public Policy , vol.25 , Issue.6 , pp. 629-665
    • Hausken, K.1
  • 26
    • 34848844983 scopus 로고    scopus 로고
    • Technical Report NBER Working Paper No. 10706. National Bureau of Economic Research
    • G. Heal and H. Kunreuther. 2004. Interdependent Security: A General Model. Technical Report NBER Working Paper No. 10706. National Bureau of Economic Research.
    • (2004) Interdependent Security: A General Model
    • Heal, G.1    Kunreuther, H.2
  • 32
    • 79955481246 scopus 로고    scopus 로고
    • How bad are selfish investments in network security?
    • Apr. 2011
    • L. Jiang, V. Anantharam, and J. Walrand. 2011. How bad are selfish investments in network security? IEEE/ACM Transactions on Networking 19, 2 (Apr. 2011), 549-560. DOI:http://dx.doi.org/10.1109/ TNET.2010.2071397
    • (2011) IEEE/ACM Transactions on Networking , vol.19 , Issue.2 , pp. 549-560
    • Jiang, L.1    Anantharam, V.2    Walrand, J.3
  • 34
    • 58449109144 scopus 로고    scopus 로고
    • Algorithms for interdependent security games
    • S. Thrun L. K. Saul, and B. Schölkopf (Eds.). MIT Press
    • M. J. Kearns and L. E. Ortiz. 2003. Algorithms for interdependent security games. In Advances in Neural Information Processing Systems, S. Thrun, L. K. Saul, and B. Schölkopf (Eds.). MIT Press.
    • (2003) Advances in Neural Information Processing Systems
    • Kearns, M.J.1    Ortiz, L.E.2
  • 51
  • 60
    • 33947600544 scopus 로고    scopus 로고
    • Learning correlated equilibria in games with compact sets of strategies
    • G. Stoltz and G. Lugosi. 2007. Learning correlated equilibria in games with compact sets of strategies. Games and Economic Behavior 59, 1 (2007), 187-208.
    • (2007) Games and Economic Behavior , vol.59 , Issue.1 , pp. 187-208
    • Stoltz, G.1    Lugosi, G.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.