A Game-theoretic Scenario for Modelling the Attacker-Defender Interaction
暂无分享,去创建一个
[1] J. W. Herrmann,et al. Game-Theoretic Analysis of Attack and Defense in Cyber-Physical Network Infrastructures , 2012 .
[2] Svein J. Knapskog,et al. Using Stochastic Game Theory to Compute the Expected Behavior of Attackers , 2005, 2005 Symposium on Applications and the Internet Workshops (SAINT 2005 Workshops).
[3] Rahul Khanna,et al. Distributed and Control Theoretic Approach to Intrusion Detection , 2022 .
[4] L. Shapley,et al. Stochastic Games* , 1953, Proceedings of the National Academy of Sciences.
[5] Karin Sallhammar,et al. Stochastic Models for Combined Security and Dependability Evaluation , 2007 .
[6] Karin Sallhammar,et al. Using Game Theory in Stochastic Models for Quantifying Security , 2004 .
[7] Huseyin Cavusoglu,et al. Decision-Theoretic and Game-Theoretic Approaches to IT Security Investment , 2008, J. Manag. Inf. Syst..
[8] Chuang Lin,et al. Modeling and security analysis of enterprise network using attack-defense stochastic game Petri nets , 2013, Secur. Commun. Networks.
[9] S. O. Falaki,et al. NETWORK INTRUSION DETECTION BASED ON ROUGH SET AND K-NEAREST NEIGHBOUR , 2008 .
[10] Nageswara S. V. Rao,et al. Game-Theoretic Analysis of Attack and Defense in Cyber-Physical Network Infrastructures , 2012 .
[11] Markus Schumacher,et al. Collaborative attack modeling , 2002, SAC '02.
[12] Ryan Trost. Practical Intrusion Analysis: Prevention and Detection for the Twenty-first Century , 2009 .
[13] Tansu Alpcan,et al. Network Security , 2010 .
[14] Branislav Bosanský,et al. Game-theoretic resource allocation for malicious packet detection in computer networks , 2012, AAMAS.
[15] Chase Qishi Wu,et al. A Survey of Game Theory as Applied to Network Security , 2010, 2010 43rd Hawaii International Conference on System Sciences.
[16] Panda Mrutyunjaya,et al. A Data Mining Approach to Network Intrusion Detection , 2015 .
[17] Assane Gueye,et al. A Game Theoretical Approach to Communication Security , 2011 .
[18] Rong Yang,et al. Designing better strategies against human adversaries in network security games , 2012, AAMAS.