Maximization of Multi-Round Network Survivability under Considerations of the Defender's Defensive Messaging Strategies
暂无分享,去创建一个
[1] Abhay Kumar Rai,et al. Different Types of Attacks on Integrated MANET-Internet Communication , 2010 .
[2] Gregory Levitin,et al. Resource Distribution in Multiple Attacks Against a Single Target , 2010, Risk analysis : an official publication of the Society for Risk Analysis.
[3] Larry Samuelson,et al. Choosing What to Protect: Strategic Defensive Allocation Against an Unknown Attacker , 2005 .
[4] V. Bier,et al. SECRECY AND DECEPTION AT EQUILIBRIUM, WITH APPLICATIONS TO ANTI‐TERRORISM RESOURCE ALLOCATION , 2011 .
[5] Robert Powell,et al. Allocating Defensive Resources with Private Information about Vulnerability , 2007, American Political Science Review.
[6] T. Basar,et al. A game theoretic analysis of intrusion detection in access control systems , 2004, 2004 43rd IEEE Conference on Decision and Control (CDC) (IEEE Cat. No.04CH37601).
[7] Kjell Hausken. Strategic defense and attack for reliability systems , 2008, Reliab. Eng. Syst. Saf..
[8] Alfons H. Salden,et al. Self-organizing mobile surveillance security networks , 2007, 2007 2nd Bio-Inspired Models of Network, Information and Computing Systems.
[9] N. Rowe. Deception in defense of computer systems from cyber-attack , 2007 .
[10] Hong-Hsu Yen,et al. Evaluation of Network Survivability Considering Degree of Disconnectivity , 2011, HAIS.
[11] Chase Qishi Wu,et al. A Survey of Game Theory as Applied to Network Security , 2010, 2010 43rd Hawaii International Conference on System Sciences.
[12] Joseph Migga Kizza. Security Threats to Computer Networks , 2013 .
[13] M. Naceur Azaiez,et al. Optimal resource allocation for security in reliability systems , 2007, Eur. J. Oper. Res..
[14] Vicki M. Bier,et al. Balancing Terrorism and Natural Disasters - Defensive Strategy with Endogenous Attacker Effort , 2007, Oper. Res..
[15] Ahmed E. Kamal,et al. Survivability strategies in multihop wireless networks [Accepted From Open Call] , 2010, IEEE Wireless Communications.
[16] T. Sandler,et al. Terrorism & Game Theory , 2003 .
[17] S. Skaperdas. Contest success functions , 1996 .
[18] Kjell Hausken,et al. Defending against multiple different attackers , 2011, Eur. J. Oper. Res..
[19] Frank Yeong-Sung Lin,et al. Maximization of network robustness considering the effect of escalation and accumulated experience of intelligent attackers , 2009 .
[20] Eytan Modiano,et al. Network Reliability With Geographically Correlated Failures , 2010, 2010 Proceedings IEEE INFOCOM.
[21] Vicki M. Bier,et al. Secrecy in Defensive Allocations as a Strategy for Achieving More Cost-Effec tive Att acker Dett errence , 2009 .