Information game of public firewall rules
暂无分享,去创建一个
Aaron Striegel | Qi Liao | Zhen Li | Qi Liao | A. Striegel | Zhen Li
[1] T. Basar,et al. A game theoretic analysis of intrusion detection in access control systems , 2004, 2004 43rd IEEE Conference on Decision and Control (CDC) (IEEE Cat. No.04CH37601).
[2] S. Cobb. Establishing firewall policy , 1996, Southcon/96 Conference Record.
[3] J. Nash. Equilibrium Points in N-Person Games. , 1950, Proceedings of the National Academy of Sciences of the United States of America.
[4] E. Rowland. Theory of Games and Economic Behavior , 1946, Nature.
[5] Anne H. H. Ngu,et al. Firewall Queries , 2004, OPODIS.
[6] T. Samak,et al. Firewall Policy Reconstruction by Active Probing: An Attacker's View , 2006, 2006 2nd IEEE Workshop on Secure Network Protocols.
[7] Ehab Al-Shaer,et al. FireCracker: A Framework for Inferring Firewall Policies using Smart Probing , 2007, 2007 IEEE International Conference on Network Protocols.