메뉴 건너뛰기




Volumn 2015-September, Issue , 2015, Pages 7341-7346

An evolutionary game-theoretic framework for cyber-threat information sharing

Author keywords

Cybersecurity; CYBEX; Evolutionary Game Theory; Incentive Model; Information Sharing

Indexed keywords


EID: 84953745168     PISSN: 15503607     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICC.2015.7249499     Document Type: Conference Paper
Times cited : (65)

References (8)
  • 1
    • 0344899914 scopus 로고    scopus 로고
    • Sharing information on computer systems security: An economic analysis
    • L. A. Gordon, M. P. Loeb, and W. Lucyshyn, "Sharing information on computer systems security: An economic analysis," Journal of Accounting and Public Policy, Vol. 22, no. 6, pp. 461-485, 2003.
    • (2003) Journal of Accounting and Public Policy , vol.22 , Issue.6 , pp. 461-485
    • Gordon, L.A.1    Loeb, M.P.2    Lucyshyn, W.3
  • 2
    • 84953777517 scopus 로고    scopus 로고
    • http://www.informationweek.com/security/attacks-and-breaches/neiman-marcus-target-data-breaches-8-facts/d/d-id/1113415.
  • 3
    • 84953777518 scopus 로고    scopus 로고
    • http://fortune.com/2014/10/02/jpmorgan-chase-disclosed-cyber-breach/.
  • 5
    • 84953777520 scopus 로고    scopus 로고
    • http://fcw.com/articles/2014/08/06/what-keeps-darpa-up-at-night.aspx.
  • 7
    • 70350154806 scopus 로고    scopus 로고
    • Evolutionary game theory: ESS, convergence stability, and NIS
    • J. Apaloo, J. S. Brown, and T. L. Vincent, "Evolutionary game theory: ESS, convergence stability, and NIS," Evolutionary Ecology Research, Vol. 11, pp. 489-515, 2009.
    • (2009) Evolutionary Ecology Research , vol.11 , pp. 489-515
    • Apaloo, J.1    Brown, J.S.2    Vincent, T.L.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.