-
2
-
-
78649611559
-
A network security assessmentmodel based on attack-defense game theory
-
B. Wang, J. Cai, S. Zhang, J. Li, A network security assessmentmodel based on attack-defense game theory, International Conference on Computer Application and System Modeling (ICCASM), 2010, (Taiyuan Shanxi, China).
-
International Conference on Computer Application and System Modeling (ICCASM), 2010, (Taiyuan Shanxi, China)
-
-
Wang, B.1
Cai, J.2
Zhang, S.3
Li, J.4
-
4
-
-
84864525858
-
Game theory for cyber security
-
ACM, New York, NY, USA
-
S. Shiva, S. Roy, D. Dasgupta, Game theory for cyber security, Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research (CSIIRW '10), ACM, 2010, (New York, NY, USA).
-
(2010)
Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research (CSIIRW '10)
-
-
Shiva, S.1
Roy, S.2
Dasgupta, D.3
-
5
-
-
36348942574
-
-
R.J. Lipton, V.V. Vazirani, M. Mihail, C. Tovey, E. Vigoda, Algorithmic game theory, 2007.
-
(2007)
Algorithmic Game Theory
-
-
Lipton, R.J.1
Vazirani, V.V.2
Mihail, M.3
Tovey, C.4
Vigoda, E.5
-
6
-
-
78650131188
-
First principles vulnerability assessment
-
J.A. Kupsch, B.P. Miller, E. Heyman, E. César, First principles vulnerability assessment, Proceedings of the 2010 ACM workshop on Cloud computing security workshop CCSW '10, 2010, (New York, NY, USA).
-
Proceedings of the 2010 ACM Workshop on Cloud Computing Security Workshop CCSW '10, 2010, (New York, NY, USA)
-
-
Kupsch, J.A.1
Miller, B.P.2
Heyman, E.3
César, E.4
-
7
-
-
84055200522
-
The new risk assessment model for information system in cloud computing environment
-
L. Peiyu, L. Dong, The new risk assessment model for information system in cloud computing environment, Procedia Eng. 15 (2011) 3200-3204.
-
(2011)
Procedia Eng.
, vol.15
, pp. 3200-3204
-
-
Peiyu, L.1
Dong, L.2
-
8
-
-
84891586363
-
Business-driven management of infrastructure-level risks in Cloud providers
-
J.O. Fitó, J. Guitart, Business-driven management of infrastructure-level risks in Cloud providers, Futur. Gener. Comput. Syst. 32 (2014) 41-53.
-
(2014)
Futur. Gener. Comput. Syst.
, vol.32
, pp. 41-53
-
-
Fitó, J.O.1
Guitart, J.2
-
9
-
-
84856119966
-
Towards a service lifecycle based methodology for risk assessment in cloud computing
-
M. Kiran, M. Jiang, D.J. Armstrong, K. Djemame, Towards a service lifecycle based methodology for risk assessment in cloud computing, Dependable, Autonomic and Secure Computing (DASC), Dec 2011, pp. 449-456.
-
Dependable, Autonomic and Secure Computing (DASC), Dec 2011
, pp. 449-456
-
-
Kiran, M.1
Jiang, M.2
Armstrong, D.J.3
Djemame, K.4
-
16
-
-
84885184956
-
A game theoretic defense framework against DoS/DDoS cyber attacks
-
T. Spyridopoulos, G. Karanikas, T. Tryfonas, G. Oikonomou, A game theoretic defense framework against DoS/DDoS cyber attacks, Comput. Secur. 38 (2013) 39-50.
-
(2013)
Comput. Secur.
, vol.38
, pp. 39-50
-
-
Spyridopoulos, T.1
Karanikas, G.2
Tryfonas, T.3
Oikonomou, G.4
-
17
-
-
84874284297
-
Game theorymeets network security and privacy
-
M.H. Manshaei, Q. Zhu, T. Alpcan, T. Başar, J.-P. Hubaux, Game theorymeets network security and privacy, ACM Comput. Surv. 45 (3) (2013) 25:1-25:39.
-
(2013)
ACM Comput. Surv.
, vol.45
, Issue.3
, pp. 25:1-25:39
-
-
Manshaei, M.H.1
Zhu, Q.2
Alpcan, T.3
Başar, T.4
Hubaux, J.-P.5
-
18
-
-
79959557055
-
Addressing cloud computing security issues
-
D. Zissis, D. Lekkas, Addressing cloud computing security issues, Futur. Gener. Comput. Syst. 28 (2012) 583-592.
-
(2012)
Futur. Gener. Comput. Syst.
, vol.28
, pp. 583-592
-
-
Zissis, D.1
Lekkas, D.2
-
20
-
-
84891944534
-
A game theoretic method to model and evaluate attack-defense strategy in cloud computing
-
G. Fan, H. Yu, L. Chen, D. Liu, A game theoretic method to model and evaluate attack-defense strategy in cloud computing, IEEE 10. Int. Conference on Services Computing (SCC), 2013, pp. 659-666.
-
IEEE 10. Int. Conference on Services Computing (SCC), 2013
, pp. 659-666
-
-
Fan, G.1
Yu, H.2
Chen, L.3
Liu, D.4
|