Optimization of rootkit revealing system resources - A game theoretic approach
暂无分享,去创建一个
[1] Yu Liu,et al. Modelling misbehaviour in ad hoc networks: a game theoretic approach for intrusion detection , 2006, Int. J. Secur. Networks.
[2] Mishaal Abdullah Al-Kadhi. Assessment of the status of spam in the Kingdom of Saudi Arabia , 2011, J. King Saud Univ. Comput. Inf. Sci..
[3] Abdulkader A. Alfantookh,et al. DoS Attacks Intelligent Detection using Neural Networks , 2006, J. King Saud Univ. Comput. Inf. Sci..
[4] J. Neumann,et al. Theory of games and economic behavior , 1945, 100 Years of Math Milestones.
[5] Lin Chen,et al. A Game Theoretical Framework on Intrusion Detection in Heterogeneous Networks , 2009, IEEE Transactions on Information Forensics and Security.
[6] Aaron Emigh. The Crimeware Landscape: Malware, Phishing, Identity Theft and Beyond , 2006, J. Digit. Forensic Pract..
[7] Yueming Cai,et al. Resource allocation based on integer programming and game theory in uplink multi-cell cooperative OFDMA systems , 2011, EURASIP J. Wirel. Commun. Netw..
[8] Liviu Iftode,et al. Monitoring Integrity Using Limited Local Memory , 2013, IEEE Transactions on Information Forensics and Security.
[9] Yoshiyasu Takefuji,et al. Towards a tamper-resistant kernel rootkit detector , 2007, SAC '07.
[10] Murali S. Kodialam,et al. Detecting network intrusions via sampling: a game theoretic approach , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[11] Prabir Bhattacharya,et al. Game theoretic models for detecting network intrusions , 2008, Comput. Commun..
[12] Yu Liu,et al. A Game Theoretic Approach to Efficient Mixed Strategies for Intrusion Detection , 2006, 2006 IEEE International Conference on Communications.
[13] T. Basar,et al. A game theoretic analysis of intrusion detection in access control systems , 2004, 2004 43rd IEEE Conference on Decision and Control (CDC) (IEEE Cat. No.04CH37601).
[14] Hesham Altwaijry,et al. Bayesian based intrusion detection system , 2012, J. King Saud Univ. Comput. Inf. Sci..
[15] Hesham Altwaijry,et al. Bayesian based intrusion detection system , 2012, J. King Saud Univ. Comput. Inf. Sci..
[16] Shrisha Rao,et al. Resource Allocation in Cloud Computing Using the Uncertainty Principle of Game Theory , 2016, IEEE Systems Journal.
[17] Shuai Liu,et al. A Game Theoretic Approach to Optimize the Performance of Host-Based IDS , 2008, 2008 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications.
[18] Huiqun Yu,et al. A Game Theory Approach to Fair and Efficient Resource Allocation in Cloud Computing , 2014 .
[19] Partha Dasgupta,et al. Kernel and Application Integrity Assurance: Ensuring Freedom from Rootkits and Malware in a Computer System , 2007, 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07).
[20] Peng Liu. A Game Theoretic Approach to Cyber Attack Prediction , 2005 .
[21] Salim Hariri,et al. Game Theory Based Network Security , 2010, J. Information Security.