Decision and Game Theory for Security
暂无分享,去创建一个
[1] Jan Willemson,et al. Serial Model for Attack Tree Computations , 2009, ICISC.
[2] R.F. Mills,et al. Using Attack and Protection Trees to Analyze Threats and Defenses to Homeland Security , 2006, MILCOM 2006 - 2006 IEEE Military Communications conference.
[3] Barbara Kordy,et al. Foundations of Attack-Defense Trees , 2010, Formal Aspects in Security and Trust.
[4] Sjouke Mauw,et al. Foundations of Attack Trees , 2005, ICISC.
[5] R. Kent. Secrets and lies. , 2007, Nursing Standard.
[6] Thomas Engel,et al. Runtime Monitoring and Dynamic Reconfiguration for Intrusion Detection Systems , 2009, RAID.
[7] Stefano Bistarelli,et al. Strategic Games on Defense Trees , 2006, Formal Aspects in Security and Trust.