Applying Bayesian game theory to analyse cyber risks of bank transaction systems
暂无分享,去创建一个
Jan van den Berg | Rhythima Shinde | Pieter Van der Veeken | Stijn Van Schooten | Mirko Dunnewind | Rhythima Shinde | Jan van den Berg | Pieter Van der Veeken | Stijn Van Schooten | M. Dunnewind
[1] Cristina Comaniciu,et al. A Bayesian game approach for intrusion detection in wireless ad hoc networks , 2006, GameNets '06.
[2] Philippe A. Janson,et al. The State of the Art in Electronic Payment Systems , 1997, Computer.
[3] Nicolas Christin,et al. Uncertainty in Interdependent Security Games , 2010, GameSec.
[4] P. Schoemaker. The Expected Utility Model: Its Variants, Purposes, Evidence and Limitations , 1982 .
[5] Ali E. Abdallah,et al. Threat modeling approaches and tools for securing architectural designs of an e-banking application , 2010, 2010 Sixth International Conference on Information Assurance and Security.
[6] E. Amoroso. Intrusion Detection , 1999 .
[7] Kristin Shields. Cybersecurity: Recognizing the Risk and Protecting Against Attacks , 2015 .