CYBEX Information Sharing Game with Objective and Subjective Players
暂无分享,去创建一个
[1] Narayan B. Mandayam,et al. When Users Interfere with Protocols: Prospect Theory in Wireless Networks using Random Access and Data Pricing as an Example , 2014, IEEE Transactions on Wireless Communications.
[2] N. Bambos,et al. Security investment games of interdependent organizations , 2008, 2008 46th Annual Allerton Conference on Communication, Control, and Computing.
[3] Stefan Rass,et al. Uncertainty in Games: Using Probability-Distributions as Payoffs , 2015, GameSec.
[4] H. Ohtsuki,et al. The replicator equation on graphs. , 2006, Journal of theoretical biology.
[5] H. Vincent Poor,et al. Prospect Theoretic Analysis of Energy Exchange Among Microgrids , 2015, IEEE Transactions on Smart Grid.
[6] Liang Xiao,et al. Evolutionary Game Theoretic Analysis of Advanced Persistent Threats Against Cloud Storage , 2017, IEEE Access.
[7] A. Tversky,et al. Prospect theory: an analysis of decision under risk — Source link , 2007 .
[8] Shamik Sengupta,et al. Establishing evolutionary game models for CYBer security information EXchange (CYBEX) , 2016, J. Comput. Syst. Sci..
[9] Ronald L. Rivest,et al. FlipIt: The Game of “Stealthy Takeover” , 2012, Journal of Cryptology.
[10] Eric Cole,et al. Advanced Persistent Threat: Understanding the Danger and How to Protect Your Organization , 2012 .
[11] Karl Sigmund. Evolutionary game dynamics : American Mathematical Society Short Course, January 4-5, 2011, New Orleans, Louisiana , 2011 .
[12] Evolutionary Random Access Game With Objective and Subjective Players , 2021, IEEE Access.
[13] Behrouz Tork Ladani,et al. Interdependency Analysis in Security Investment against Strategic Attacks , 2020, Inf. Syst. Frontiers.
[14] H. Vincent Poor,et al. Cloud Storage Defense Against Advanced Persistent Threats: A Prospect Theoretic Study , 2017, IEEE Journal on Selected Areas in Communications.
[15] H. Ohtsuki,et al. Evolutionary stability on graphs. , 2008, Journal of theoretical biology.
[16] Eitan Altman,et al. Evolutionary dynamics and potential games in non-cooperative routing , 2007, 2007 5th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks and Workshops.
[17] Nicholas Bambos,et al. Security Decision-Making among Interdependent Organizations , 2008, 2008 21st IEEE Computer Security Foundations Symposium.
[18] D. Friedman. On economic applications of evolutionary game theory , 1998 .
[19] Dusit Niyato,et al. Dynamics of Network Selection in Heterogeneous Wireless Networks: An Evolutionary Game Approach , 2009, IEEE Transactions on Vehicular Technology.
[20] Kjell Hausken,et al. Security Investment, Hacking, and Information Sharing between Firms and between Hackers , 2017, Games.
[21] Christoph Meinel,et al. Advanced persistent threats: Behind the scenes , 2016, 2016 Annual Conference on Information Science and Systems (CISS).
[22] D. Prelec. The Probability Weighting Function , 1998 .
[23] Stefan Rass,et al. Uncertainty in Cyber Security Investments , 2017, ArXiv.