A differential game model of intrusion detection system in cloud computing
暂无分享,去创建一个
Zhi Li | Haitao Xu | Yanzhu Liu | Haitao Xu | Zhi Li | Yanzhu Liu
[1] Ahmed Patel,et al. An intrusion detection and prevention system in cloud computing: A systematic review , 2013, J. Netw. Comput. Appl..
[2] Shahaboddin Shamshirband,et al. Cooperative game theoretic approach using fuzzy Q-learning for detecting and preventing intrusions in wireless sensor networks , 2014, Eng. Appl. Artif. Intell..
[3] Avinash Dixit,et al. A MODEL OF DUOPOLY SUGGESTING A THEORY OF ENTRY BARRIERS , 1978 .
[4] Sajal K. Das,et al. Intrusion detection in sensor networks: a non-cooperative game approach , 2004, Third IEEE International Symposium on Network Computing and Applications, 2004. (NCA 2004). Proceedings..
[5] Irfan Gul,et al. Distributed Cloud Intrusion Detection Model , 2011 .
[6] Yi-Ming Chen,et al. A Game Theoretic Framework for Multi-agent Deployment in Intrusion Detection Systems , 2010, Security Informatics.
[7] David W. K. Yeung,et al. Cooperative Stochastic Differential Games , 2005 .
[8] Heejo Lee,et al. This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination. INVITED PAPER Cyber–Physical Security of a Smart Grid Infrastructure , 2022 .
[9] Zhu Han,et al. Applications of Repeated Games in Wireless Networks: A Survey , 2015, IEEE Communications Surveys & Tutorials.
[10] Cristina Comaniciu,et al. A Bayesian game approach for intrusion detection in wireless ad hoc networks , 2006, GameNets '06.
[11] J. Nash,et al. NON-COOPERATIVE GAMES , 1951, Classics in Game Theory.
[12] Lin Chen,et al. Fight jamming with jamming - A game theoretic analysis of jamming attack in wireless networks and defense strategy , 2011, Comput. Networks.
[13] Ramjee Prasad,et al. An Intrusion Detection game in access control system for the M2M local cloud platform , 2013, 2013 19th Asia-Pacific Conference on Communications (APCC).
[14] Massimiliano Rak,et al. Stealthy Denial of Service Strategy in Cloud Computing , 2015, IEEE Transactions on Cloud Computing.
[15] Rufus Isaacs,et al. DIFFERENTIAL GAMES III: THE BASIC PRINCIPLES OF THE SOLUTION PROCESS , 1954 .
[16] Massimo Ficco. Security event correlation approach for cloud computing , 2013, Int. J. High Perform. Comput. Netw..
[17] Quanyan Zhu,et al. Game theory meets network security and privacy , 2013, CSUR.
[18] T. Başar,et al. An Intrusion Detection Game with Limited Observations , 2005 .
[19] Nitasha Hasteer,et al. Intrusion Detection and Prevention in Cloud Environment: A Systematic Review , 2013 .
[20] T. Başar,et al. Dynamic Noncooperative Game Theory , 1982 .
[21] Roberto Bifulco,et al. Integrating a network IDS into an open source Cloud Computing environment , 2010, 2010 Sixth International Conference on Information Assurance and Security.
[22] Yanzhu Liu,et al. A non-cooperative game model of intrusion detection system in cloud computing , 2015 .
[23] Christopher Leckie,et al. A survey of coordinated attacks and collaborative intrusion detection , 2010, Comput. Secur..
[24] T. Basar,et al. A game theoretic approach to decision and analysis in network intrusion detection , 2003, 42nd IEEE International Conference on Decision and Control (IEEE Cat. No.03CH37475).