A dynamic game solution to malware attack
暂无分享,去创建一个
[1] Eitan Altman,et al. Maximum Damage Malware Attack in Mobile Wireless Networks , 2010, 2010 Proceedings IEEE INFOCOM.
[2] Eitan Altman,et al. Dispatch then stop: Optimal dissemination of security patches in mobile wireless networks , 2010, 49th IEEE Conference on Decision and Control (CDC).
[3] Rajmohan Rajaraman,et al. Existence Theorems and Approximation Algorithms for Generalized Network Security Games , 2010, 2010 IEEE 30th International Conference on Distributed Computing Systems.
[4] Eitan Altman,et al. Optimal propagation of security patches in mobile wireless networks: extended abstract , 2010, SIGMETRICS '10.
[5] Saswati Sarkar,et al. Dynamic malware attack in energy-constrained mobile wireless networks , 2010, 2010 Information Theory and Applications Workshop (ITA).
[6] Eitan Altman,et al. Maximum Damage Malware Attack in Mobile Wireless Networks , 2010, 2010 Proceedings IEEE INFOCOM.
[7] Eitan Altman,et al. Optimal quarantining of wireless malware through power control , 2009, 2009 Information Theory and Applications Workshop.
[8] Piet Van Mieghem,et al. Protecting Against Network Infections: A Game Theoretic Perspective , 2009, IEEE INFOCOM 2009.
[9] Sencun Zhu,et al. A Social Network Based Patching Scheme for Worm Containment in Cellular Networks , 2009, IEEE INFOCOM 2009.
[10] Ji Yi,et al. A Game Theoretical Attack-Defense Model Oriented to Network Security Risk Assessment , 2008, 2008 International Conference on Computer Science and Software Engineering.
[11] R. Núñez Queija,et al. Scaling Laws for File Dissemination in P2P Networks with Random Contacts , 2008, 2008 16th Interntional Workshop on Quality of Service.
[12] Yun Zou,et al. Optimal Internet Worm Treatment Strategy Based on the Two‐Factor Model , 2008 .
[13] Wei Jiang,et al. A Game Theoretic Method for Decision and Analysis of the Optimal Active Defense Strategy , 2007, 2007 International Conference on Computational Intelligence and Security (CIS 2007).
[14] Jing Zhao,et al. A Model of Hierarchical Key Assignment Scheme with CRT , 2007, 2007 International Conference on Computational Intelligence and Security (CIS 2007).
[15] Ahmed Helmy,et al. Encounter-based worms: analysis and defense , 2006, 2006 2nd IEEE Workshop on Wireless Mesh Networks.
[16] Ger Koole,et al. The message delay in mobile ad hoc networks , 2005, Perform. Evaluation.
[17] Pan Hui,et al. Pocket switched networks and human mobility in conference environments , 2005, WDTN '05.
[18] Pan Hui,et al. Pocket Switched Networks and the Consequences of Human Mobility in Conference Environments , 2005, SIGCOMM 2005.
[19] A. Helmy,et al. VACCINE : War of the Worms in Wired and Wireless Networks , 2005 .
[20] T. Basar,et al. A game theoretic analysis of intrusion detection in access control systems , 2004, 2004 43rd IEEE Conference on Decision and Control (CDC) (IEEE Cat. No.04CH37601).
[21] Robert G. Cole. Initial Studies on Worm Propagation in Manets for Future Army Combat Systems , 2004 .
[22] Vern Paxson,et al. A Worst-Case Worm , 2004 .
[23] Peng Liu,et al. Incentive-based modeling and inference of attacker intent, objectives, and strategies , 2003, CCS '03.
[24] Donald F. Towsley,et al. Worm propagation modeling and analysis under dynamic quarantine defense , 2003, WORM '03.
[25] Kevin A. Kwiat,et al. Modeling the spread of active worms , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[26] Christian Bettstetter,et al. Mobility modeling in wireless networks: categorization, smooth movement, and border effects , 2001, MOCO.
[27] Wenke Lee,et al. Intrusion detection in wireless ad-hoc networks , 2000, MobiCom '00.
[28] James E. Cherry. D & C , 2000 .
[29] Daryl J. Daley,et al. Epidemic Modelling: An Introduction , 1999 .
[30] G. P. Szegö,et al. Differential games and related topics , 1971 .
[31] T. Kurtz. Solutions of ordinary differential equations as limits of pure jump markov processes , 1970, Journal of Applied Probability.