A game theoretic model for enabling honeypots in IoT networks
暂无分享,去创建一个
[1] Robert L. Devaney,et al. A First Course In Chaotic Dynamical Systems: Theory And Experiment , 1993 .
[2] Yang Xiao,et al. Game Theory for Network Security , 2013, IEEE Communications Surveys & Tutorials.
[3] Weiyi Liu,et al. Security analysis for Cyber-Physical Systems against stealthy deception attacks , 2013, 2013 American Control Conference.
[4] Shambhu Upadhyaya,et al. A Deception Framework for Survivability Against Next Generation Cyber Attacks , 2012 .
[5] Weizhe Zhang,et al. Security Architecture of the Internet of Things Oriented to Perceptual Layer , 2013 .
[6] Michael Massoth,et al. Honeypot Framework for Wireless Sensor Networks , 2013, MoMM '13.
[7] Donald C. Daniel,et al. Strategic military deception , 1982 .
[8] N. Garg,et al. Deception in Honeynets: A Game-Theoretic Analysis , 2007, 2007 IEEE SMC Information Assurance and Security Workshop.
[9] Branislav Bosanský,et al. Game Theoretic Model of Strategic Honeypot Selection in Computer Networks , 2012, GameSec.
[10] Peng Liu,et al. Using Signaling Games to Model the Multi-step Attack-Defense Scenarios on Confidentiality , 2012, GameSec.
[11] Daniel Grosu,et al. A Game Theoretic Investigation of Deception in Network Security , 2009, ICCCN.
[12] Chelsea Dobbins,et al. Guest Editorial Special Issue on: Big Data Analytics in Intelligent Systems , 2015 .
[13] Amr M. Youssef,et al. A game theoretic investigation for high interaction honeypots , 2012, 2012 IEEE International Conference on Communications (ICC).
[14] David M. Kreps,et al. Signaling Games and Stable Equilibria , 1987 .