메뉴 건너뛰기




Volumn , Issue , 2014, Pages 813-817

Stealthy attacks and observable defenses: A game theoretic model under strict resource constraints

Author keywords

Security games; Stealthy attacks

Indexed keywords

FLOW MEASUREMENT; INFORMATION SCIENCE; MOBILE SECURITY;

EID: 84949926542     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/GlobalSIP.2014.7032232     Document Type: Conference Paper
Times cited : (26)

References (14)
  • 5
    • 84899427474 scopus 로고    scopus 로고
    • Security games with surveillance cost and optimal timing of attack execution
    • B. An, M. Brown, Y. Vorobeychik, and M. Tambe. Security Games with Surveillance Cost and Optimal Timing of Attack Execution. In Proc. of AAMAS, 2013.
    • (2013) Proc. of AAMAS
    • An, B.1    Brown, M.2    Vorobeychik, Y.3    Tambe, M.4
  • 7
    • 84936102256 scopus 로고    scopus 로고
    • Towards a metric for communication network vulnerability to attacks: A game theoretic approach
    • A. Gueye, V. Marbukh, and J. C. Walrand. Towards a Metric for Communication Network Vulnerability to Attacks: A Game Theoretic Approach. In Proc. of Gamenets, 2012.
    • (2012) Proc. of Gamenets
    • Gueye, A.1    Marbukh, V.2    Walrand, J.C.3
  • 8
    • 84936081199 scopus 로고    scopus 로고
    • Kaspersky Lab
    • Kaspersky Lab. Flame. the latest cyber-attack. http://www. kaspersky. com/flame, 2012.
    • (2012) The Latest Cyber-attack
  • 11
    • 84936125392 scopus 로고    scopus 로고
    • Mitigating covert compromises: A game-theoretic model of targeted and non-targeted covert attacks
    • A. Laszka, B. Johnson, and J. Grossklags. Mitigating Covert Compromises: A Game-Theoretic Model of Targeted and Non-Targeted Covert Attacks. In Proc. of WINE, 2013.
    • (2013) Proc. of WINE
    • Laszka, A.1    Johnson, B.2    Grossklags, J.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.