Defense-in-Depth-Games
暂无分享,去创建一个
[1] William L. Simon,et al. The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders & Deceivers , 2005 .
[2] Stefan Rass,et al. Cut-The-Rope: A Game of Stealthy Intrusion , 2019, GameSec.
[3] Mark Fabro,et al. Control Systems Cyber Security: Defense-in-Depth Strategies , 2006 .
[4] Tony Q. S. Quek,et al. A game theoretic model for enabling honeypots in IoT networks , 2016, 2016 IEEE International Conference on Communications (ICC).
[5] Ping Chen,et al. A Study on Advanced Persistent Threats , 2014, Communications and Multimedia Security.
[6] Oded Goldreich,et al. Foundations of Cryptography: Volume 1, Basic Tools , 2001 .
[7] Quanyan Zhu,et al. Physical Intrusion Games—Optimizing Surveillance by Simulation and Game Theory , 2017, IEEE Access.
[8] Quanyan Zhu,et al. GADAPT: A Sequential Game-Theoretic Framework for Designing Defense-in-Depth Strategies Against Advanced Persistent Threats , 2016, GameSec.
[9] Stefan Rass,et al. Honeypot Type Selection Games for Smart Grid Networks , 2019, GameSec.
[10] Quanyan Zhu,et al. Analysis and Computation of Adaptive Defense Strategies Against Advanced Persistent Threats for Cyber-Physical Systems , 2018, GameSec.