Game Theory Meets Information Security Management
暂无分享,去创建一个
Chris Hankin | Emmanouil A. Panaousis | Andrew Fielder | Pasquale Malacaria | Fabrizio Smeraldi | C. Hankin | E. Panaousis | P. Malacaria | F. Smeraldi | Andrew Fielder
[1] A. Acquisti. Losses , Gains , and Hyperbolic Discounting : An Experimental Approach to Information Security Attitudes and Behavior , 2003 .
[2] Thorsten Theobald,et al. Games of fixed rank: a hierarchy of bimatrix games , 2005, SODA '07.
[3] Nicolas Christin,et al. Secure or insure?: a game-theoretic analysis of information security games , 2008, WWW.
[4] Vincent Conitzer,et al. Stackelberg vs. Nash in Security Games: An Extended Investigation of Interchangeability, Equivalence, and Uniqueness , 2011, J. Artif. Intell. Res..
[5] Quanyan Zhu,et al. Game theory meets network security and privacy , 2013, CSUR.
[6] Vikram Krishnamurthy,et al. Game Theory for Networks , 2012, Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering.
[7] Vladik Kreinovich,et al. Security games with interval uncertainty , 2013, AAMAS.
[8] Tansu Alpcan,et al. Network Security , 2010 .
[9] Nicolas Christin,et al. Nash Equilibria for Weakest Target Security Games with Heterogeneous Agents , 2011, GAMENETS.
[10] Jeannette M. Wing,et al. Game strategies in network security , 2005, International Journal of Information Security.
[11] Manish Jain,et al. Computing optimal randomized resource allocations for massive security games , 2009, AAMAS.
[12] Chris Hankin,et al. Payoffs, Intensionality and Abstraction in Games , 2013, Computation, Logic, Games, and Quantum Foundations.