메뉴 건너뛰기




Volumn 9406, Issue , 2015, Pages 289-308

Flip the cloud: Cyber-physical signaling games in the presence of advanced persistent threats

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTATION THEORY; COST EFFECTIVENESS; DECISION THEORY; EMBEDDED SYSTEMS;

EID: 84953209535     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-319-25594-1_16     Document Type: Conference Paper
Times cited : (89)

References (21)
  • 1
    • 84953250223 scopus 로고    scopus 로고
    • Delphi drive
    • Delphi drive, Delphi Automotive. http://www.delphi.com/delphi-drive
    • Delphi Automotive
  • 2
    • 84953267079 scopus 로고    scopus 로고
    • Gestalt
    • Gestalt, Mirium-Webster. http://www.merriam-webster.com/dictionary/gestalt
    • Mirium-Webster
  • 5
    • 77954894437 scopus 로고    scopus 로고
    • Cloud computing: A study of infrastructure as a service (IAAS)
    • Bhardwaj, S., Jain, L., Jain, S.: Cloud computing: A study of infrastructure as a service (IAAS). Int. J. Eng. Inf. Technol. 2(1), 60-63 (2010)
    • (2010) Int. J. Eng. Inf. Technol , vol.2 , Issue.1 , pp. 60-63
    • Bhardwaj, S.1    Jain, L.2    Jain, S.3
  • 6
    • 84869448367 scopus 로고    scopus 로고
    • Defending against the unknown enemy: Applying FlipIt to system security
    • In: Grossklags, J., Walrand, J. (eds.), Springer, Heidelberg
    • Bowers, K.D., van Dijk, M., Griffin, R., Juels, A., Oprea, A., Rivest, R.L., Triandopoulos, N.: Defending against the unknown enemy: applying FlipIt to system security. In: Grossklags, J., Walrand, J. (eds.) GameSec 2012. LNCS, vol. 7638, pp. 248-263. Springer, Heidelberg (2012)
    • (2012) Gamesec 2012. LNCS , vol.7638 , pp. 248-263
    • Bowers, K.D.1    Van Dijk, M.2    Griffin, R.3    Juels, A.4    Oprea, A.5    Rivest, R.L.6    Triandopoulos, N.7
  • 7
    • 80053117505 scopus 로고    scopus 로고
    • A game theoretic investigation of deception in network security
    • Carroll, T.E., Grosu, D.: A game theoretic investigation of deception in network security. In: Security and Communication, Networks, vol. 4(10), pp. 1162-1172 (2011)
    • (2011) Security and Communication, Networks , vol.4 , Issue.10 , pp. 1162-1172
    • Carroll, T.E.1    Grosu, D.2
  • 8
    • 84958523035 scopus 로고    scopus 로고
    • Cyber security via signaling games: Toward a science of cyber security
    • In: Natarajan, R. (ed.), Springer, Heidelberg
    • Casey, W., Morales, J.A., Nguyen, T., Spring, J., Weaver, R., Wright, E., Metcalf, L., Mishra, B.: Cyber security via signaling games: toward a science of cyber security. In: Natarajan, R. (ed.) ICDCIT 2014. LNCS, vol. 8337, pp. 34-42. Springer, Heidelberg (2014)
    • (2014) ICDCIT 2014. LNCS , vol.8337 , pp. 34-42
    • Casey, W.1    Morales, J.A.2    Nguyen, T.3    Spring, J.4    Weaver, R.5    Wright, E.6    Metcalf, L.7    Mishra, B.8
  • 9
    • 84909992134 scopus 로고    scopus 로고
    • A dynamic bayesian security game framework for strategic defense mechanism design
    • Poovendran, R., Saad,W. (eds.), Springer, Heidelberg
    • Farhang, S., Manshaei, M.H., Esfahani, M.N., Zhu, Q.: A dynamic bayesian security game framework for strategic defense mechanism design. In: Poovendran, R., Saad,W. (eds.) GameSec 2014. LNCS, vol. 8840, pp. 319-328. Springer, Heidelberg (2014)
    • (2014) Gamesec 2014. LNCS , vol.8840 , pp. 319-328
    • Farhang, S.1    Manshaei, M.H.2    Esfahani, M.N.3    Zhu, Q.4
  • 11
    • 84988952901 scopus 로고    scopus 로고
    • How googles self-driving car works
    • 18 October
    • Guizzo, E.: How googles self-driving car works. IEEE Spectrum Online, 18 October
    • IEEE Spectrum Online
    • Guizzo, E.1
  • 14
    • 0002021736 scopus 로고
    • Equilibrium points in n-person games
    • Nash, J.F., et al.: Equilibrium points in n-person games. Proc. Nat. Acad. Sci. USA 36(1), 48-49 (1950)
    • (1950) Proc. Nat. Acad. Sci. USA , vol.36 , Issue.1 , pp. 48-49
    • Nash, J.F.1
  • 16
    • 34748920692 scopus 로고    scopus 로고
    • Argos: An emulator for fingerprinting zeroday attacks for advertised honeypots with automatic signature generation
    • Portokalidis, G., Slowinska, A., Bos, H.: Argos: an emulator for fingerprinting zeroday attacks for advertised honeypots with automatic signature generation. ACM SIGOPS Operating Syst. Rev. 40(4), 15-27 (2006)
    • (2006) ACM SIGOPS Operating Syst. Rev , vol.40 , Issue.4 , pp. 15-27
    • Portokalidis, G.1    Slowinska, A.2    Bos, H.3
  • 19
    • 80052169144 scopus 로고    scopus 로고
    • Advanced persistent threats and how to monitor and deter them
    • Tankard, C.: Advanced persistent threats and how to monitor and deter them. Netw. Secur. 2011(8), 16-19 (2011)
    • (2011) Netw. Secur , vol.2011 , Issue.8 , pp. 16-19
    • Tankard, C.1
  • 20
    • 84890434312 scopus 로고    scopus 로고
    • Flipit: The game of “stealthy takeover”
    • Van Dijk, M., Juels, A., Oprea, A., Rivest, R.L.: Flipit: The game of “stealthy takeover”. J. Cryptol. 26(4), 655-713 (2013)
    • (2013) J. Cryptol , vol.26 , Issue.4 , pp. 655-713
    • Van Dijk, M.1    Juels, A.2    Oprea, A.3    Rivest, R.L.4
  • 21
    • 70350704685 scopus 로고    scopus 로고
    • Modeling secrecy and deception in a multipleperiod attacker-defender signaling game
    • Zhuang, J., Bier, V.M., Alagoz, O.: Modeling secrecy and deception in a multipleperiod attacker-defender signaling game. Eur. J. Oper. Res. 203(2), 409-418 (2010)
    • (2010) Eur. J. Oper. Res , vol.203 , Issue.2 , pp. 409-418
    • Zhuang, J.1    Bier, V.M.2    Alagoz, O.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.