Game Theory for Infrastructure Security: The Power of Intent-Based Adversary Models11Part of the results included in this chapter was presented in [1] and [2].
暂无分享,去创建一个
Xinwen Fu | Sajal K. Das | Nan Zhang | Min Dan | Wei Yu | Xin Jin | Xinwen Fu | Wei Yu | Xin Jin | N. Zhang | Min Dan
[1] Alexander Liu,et al. AI Lessons Learned from Experiments in Insider Threat Detection , 2006, AAAI Spring Symposium: What Went Wrong and Why: Lessons from AI Research and Applications.
[2] B. Karp,et al. Autograph: Toward Automated, Distributed Worm Signature Detection , 2004, USENIX Security Symposium.
[3] Refik Molva,et al. Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.
[4] Lawrence A. Gordon,et al. Using information security as a response to competitor analysis systems , 2001, CACM.
[5] Sajal K. Das,et al. gPath: A Game-Theoretic Path Selection Algorithm to Protect Tor's Anonymity , 2010, GameSec.
[6] Wei Zhao,et al. Privacy-Preserving Data Mining Systems , 2007, Computer.
[7] Peng Liu,et al. Incentive-based modeling and inference of attacker intent, objectives, and strategies , 2005, ACM Trans. Inf. Syst. Secur..
[8] Sajal K. Das,et al. Maintaining Defender's Reputation in Anomaly Detection Against Insider Attacks , 2010, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).
[9] A. Liu,et al. A comparison of system call feature representations for insider threat detection , 2005, Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop.
[10] Gregory Stephens,et al. Statistical profiling and visualization for detection of malicious insider attacks on computer networks , 2004, VizSEC/DMSEC '04.
[11] K. J. Ray Liu,et al. Game Theoretic Analysis of Cooperation Stimulation and Security in Autonomous Mobile Ad Hoc Networks , 2007, IEEE Transactions on Mobile Computing.
[12] VARUN CHANDOLA,et al. Anomaly detection: A survey , 2009, CSUR.
[13] Wei Zhao,et al. Distributed Privacy Preserving Information Sharing , 2005, VLDB.
[14] Nick Mathewson,et al. Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.