-
1
-
-
84953250223
-
-
Delphi drive
-
Delphi drive, Delphi Automotive. http://www.delphi.com/delphi-drive
-
Delphi Automotive
-
-
-
2
-
-
84953267079
-
-
Gestalt
-
Gestalt, Mirium-Webster. http://www.merriam-webster.com/dictionary/gestalt
-
Mirium-Webster
-
-
-
5
-
-
77954894437
-
Cloud computing: A study of infrastructure as a service (IAAS)
-
Bhardwaj, S., Jain, L., Jain, S.: Cloud computing: A study of infrastructure as a service (IAAS). Int. J. Eng. Inf. Technol. 2(1), 60-63 (2010)
-
(2010)
Int. J. Eng. Inf. Technol
, vol.2
, Issue.1
, pp. 60-63
-
-
Bhardwaj, S.1
Jain, L.2
Jain, S.3
-
6
-
-
84869448367
-
Defending against the unknown enemy: Applying FlipIt to system security
-
In: Grossklags, J., Walrand, J. (eds.), Springer, Heidelberg
-
Bowers, K.D., van Dijk, M., Griffin, R., Juels, A., Oprea, A., Rivest, R.L., Triandopoulos, N.: Defending against the unknown enemy: applying FlipIt to system security. In: Grossklags, J., Walrand, J. (eds.) GameSec 2012. LNCS, vol. 7638, pp. 248-263. Springer, Heidelberg (2012)
-
(2012)
Gamesec 2012. LNCS
, vol.7638
, pp. 248-263
-
-
Bowers, K.D.1
Van Dijk, M.2
Griffin, R.3
Juels, A.4
Oprea, A.5
Rivest, R.L.6
Triandopoulos, N.7
-
7
-
-
80053117505
-
A game theoretic investigation of deception in network security
-
Carroll, T.E., Grosu, D.: A game theoretic investigation of deception in network security. In: Security and Communication, Networks, vol. 4(10), pp. 1162-1172 (2011)
-
(2011)
Security and Communication, Networks
, vol.4
, Issue.10
, pp. 1162-1172
-
-
Carroll, T.E.1
Grosu, D.2
-
8
-
-
84958523035
-
Cyber security via signaling games: Toward a science of cyber security
-
In: Natarajan, R. (ed.), Springer, Heidelberg
-
Casey, W., Morales, J.A., Nguyen, T., Spring, J., Weaver, R., Wright, E., Metcalf, L., Mishra, B.: Cyber security via signaling games: toward a science of cyber security. In: Natarajan, R. (ed.) ICDCIT 2014. LNCS, vol. 8337, pp. 34-42. Springer, Heidelberg (2014)
-
(2014)
ICDCIT 2014. LNCS
, vol.8337
, pp. 34-42
-
-
Casey, W.1
Morales, J.A.2
Nguyen, T.3
Spring, J.4
Weaver, R.5
Wright, E.6
Metcalf, L.7
Mishra, B.8
-
9
-
-
84909992134
-
A dynamic bayesian security game framework for strategic defense mechanism design
-
Poovendran, R., Saad,W. (eds.), Springer, Heidelberg
-
Farhang, S., Manshaei, M.H., Esfahani, M.N., Zhu, Q.: A dynamic bayesian security game framework for strategic defense mechanism design. In: Poovendran, R., Saad,W. (eds.) GameSec 2014. LNCS, vol. 8840, pp. 319-328. Springer, Heidelberg (2014)
-
(2014)
Gamesec 2014. LNCS
, vol.8840
, pp. 319-328
-
-
Farhang, S.1
Manshaei, M.H.2
Esfahani, M.N.3
Zhu, Q.4
-
11
-
-
84988952901
-
How googles self-driving car works
-
18 October
-
Guizzo, E.: How googles self-driving car works. IEEE Spectrum Online, 18 October
-
IEEE Spectrum Online
-
-
Guizzo, E.1
-
12
-
-
84924680020
-
A survey of research on cloud robotics and automation
-
Kehoe, B., Patil, S., Abbeel, P., Goldberg, K.: A survey of research on cloud robotics and automation. IEEE Trans. Autom. Sci. Eng. 12(2), 398-409 (2015)
-
(2015)
IEEE Trans. Autom. Sci. Eng
, vol.12
, Issue.2
, pp. 398-409
-
-
Kehoe, B.1
Patil, S.2
Abbeel, P.3
Goldberg, K.4
-
14
-
-
0002021736
-
Equilibrium points in n-person games
-
Nash, J.F., et al.: Equilibrium points in n-person games. Proc. Nat. Acad. Sci. USA 36(1), 48-49 (1950)
-
(1950)
Proc. Nat. Acad. Sci. USA
, vol.36
, Issue.1
, pp. 48-49
-
-
Nash, J.F.1
-
16
-
-
34748920692
-
Argos: An emulator for fingerprinting zeroday attacks for advertised honeypots with automatic signature generation
-
Portokalidis, G., Slowinska, A., Bos, H.: Argos: an emulator for fingerprinting zeroday attacks for advertised honeypots with automatic signature generation. ACM SIGOPS Operating Syst. Rev. 40(4), 15-27 (2006)
-
(2006)
ACM SIGOPS Operating Syst. Rev
, vol.40
, Issue.4
, pp. 15-27
-
-
Portokalidis, G.1
Slowinska, A.2
Bos, H.3
-
17
-
-
80455138227
-
-
Technical report, DTIC Document
-
Sampigethaya, K., Huang, L., Li, M., Poovendran, R., Matsuura, K., Sezaki, K.: Caravan: Providing location privacy for vanet. Technical report, DTIC Document (2005)
-
(2005)
Caravan: Providing Location Privacy for Vanet
-
-
Sampigethaya, K.1
Huang, L.2
Li, M.3
Poovendran, R.4
Matsuura, K.5
Sezaki, K.6
-
18
-
-
35349016950
-
Amoeba: Robust location privacy scheme for vanet
-
Sampigethaya, K., Li, M., Huang, L., Poovendran, R.: Amoeba: Robust location privacy scheme for vanet. IEEE J. Sel. Areas Commun. 25(8), 1569-1589 (2007)
-
(2007)
IEEE J. Sel. Areas Commun
, vol.25
, Issue.8
, pp. 1569-1589
-
-
Sampigethaya, K.1
Li, M.2
Huang, L.3
Poovendran, R.4
-
19
-
-
80052169144
-
Advanced persistent threats and how to monitor and deter them
-
Tankard, C.: Advanced persistent threats and how to monitor and deter them. Netw. Secur. 2011(8), 16-19 (2011)
-
(2011)
Netw. Secur
, vol.2011
, Issue.8
, pp. 16-19
-
-
Tankard, C.1
-
20
-
-
84890434312
-
Flipit: The game of “stealthy takeover”
-
Van Dijk, M., Juels, A., Oprea, A., Rivest, R.L.: Flipit: The game of “stealthy takeover”. J. Cryptol. 26(4), 655-713 (2013)
-
(2013)
J. Cryptol
, vol.26
, Issue.4
, pp. 655-713
-
-
Van Dijk, M.1
Juels, A.2
Oprea, A.3
Rivest, R.L.4
-
21
-
-
70350704685
-
Modeling secrecy and deception in a multipleperiod attacker-defender signaling game
-
Zhuang, J., Bier, V.M., Alagoz, O.: Modeling secrecy and deception in a multipleperiod attacker-defender signaling game. Eur. J. Oper. Res. 203(2), 409-418 (2010)
-
(2010)
Eur. J. Oper. Res
, vol.203
, Issue.2
, pp. 409-418
-
-
Zhuang, J.1
Bier, V.M.2
Alagoz, O.3
|