메뉴 건너뛰기




Volumn 8840, Issue , 2014, Pages 319-328

A dynamic Bayesian security game framework for strategic defense mechanism design

Author keywords

[No Author keywords available]

Indexed keywords

GAME THEORY; MACHINE DESIGN;

EID: 84909992134     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-319-12601-2_18     Document Type: Article
Times cited : (30)

References (13)
  • 2
    • 84908219846 scopus 로고    scopus 로고
    • Security games applied to real-world: Research contributions and challenges
    • Springer
    • Jain, M., An, B., Tambe, M.: Security games applied to real-world: Research contributions and challenges. In: Moving Target Defense II, pp. 15–39. Springer (2013)
    • (2013) Moving Target Defense II , pp. 15-39
    • Jain, M.1    An, B.2    Tambe, M.3
  • 3
    • 84898021102 scopus 로고    scopus 로고
    • Modeling cooperative, selfish andmalicious behaviors for trajectory privacy preservation using bayesian game theory
    • IEEE
    • Jin, X., Pissinou, N., Pumpichet, S., Kamhoua, C.A., Kwiat, K.: Modeling cooperative, selfish andmalicious behaviors for trajectory privacy preservation using bayesian game theory. In: Local Computer Networks (LCN), pp. 835–842. IEEE (2013)
    • (2013) Local Computer Networks (LCN) , pp. 835-842
    • Jin, X.1    Pissinou, N.2    Pumpichet, S.3    Kamhoua, C.A.4    Kwiat, K.5
  • 5
    • 84869465454 scopus 로고    scopus 로고
    • Using signaling games to model the multi-step attackdefense scenarios on confidentiality
    • In: Grossklags, J., Walrand, J. (eds.), Springer, Heidelberg
    • Lin, J., Liu, P., Jing, J.: Using signaling games to model the multi-step attackdefense scenarios on confidentiality. In: Grossklags, J., Walrand, J. (eds.) GameSec 2012. LNCS, vol. 7638, pp. 118–137. Springer, Heidelberg (2012)
    • (2012) GameSec 2012. LNCS , vol.7638 , pp. 118-137
    • Lin, J.1    Liu, P.2    Jing, J.3
  • 10
    • 84899919065 scopus 로고    scopus 로고
    • Playing games for security: An efficient exact algorithm for solving bayesian stackelberg games
    • Paruchuri, P., Pearce, J.P., Marecki, J., Tambe, M., Ordonez, F., Kraus, S.: Playing games for security: An efficient exact algorithm for solving bayesian stackelberg games. In: Proceedings of AAMAS 2008, pp. 895–902 (2008)
    • (2008) Proceedings of AAMAS 2008 , pp. 895-902
    • Paruchuri, P.1    Pearce, J.P.2    Marecki, J.3    Tambe, M.4    Ordonez, F.5    Kraus, S.6
  • 11
    • 84869444399 scopus 로고    scopus 로고
    • Are we compromised? Modelling security assessment games
    • In: Grossklags, J., Walrand, J. (eds.), Springer, Heidelberg
    • Pham, V., Cid, C.: Are we compromised? Modelling security assessment games. In: Grossklags, J., Walrand, J. (eds.) GameSec 2012. LNCS, vol. 7638, pp. 234–247. Springer, Heidelberg (2012)
    • (2012) GameSec 2012. LNCS , vol.7638 , pp. 234-247
    • Pham, V.1    Cid, C.2
  • 12
    • 84893599604 scopus 로고    scopus 로고
    • A game-theoretic approach for deceiving remote operating system fingerprinting
    • Rahman, M.A., Manshaei, M.H., Al-Shaer, E.: A game-theoretic approach for deceiving remote operating system fingerprinting. In: IEEE CNS, pp. 73–81 (2013)
    • (2013) IEEE CNS , pp. 73-81
    • Rahman, M.A.1    Manshaei, M.H.2    Al-Shaer, E.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.