Security investment games of interdependent organizations
暂无分享,去创建一个
[1] Robert J. Plemmons,et al. Nonnegative Matrices in the Mathematical Sciences , 1979, Classics in Applied Mathematics.
[2] John N. Tsitsiklis,et al. Parallel and distributed computation , 1989 .
[3] D. Fudenberg,et al. The Theory of Learning in Games , 1998 .
[4] Edward W. Felten,et al. Password management strategies for online accounts , 2006, SOUPS '06.
[5] John N. Tsitsiklis,et al. Parallel and distributed computation , 1989 .
[6] Richard W. Cottle,et al. Linear Complementarity Problem. , 1992 .
[7] Nicholas Bambos,et al. Security Decision-Making among Interdependent Organizations , 2008, 2008 21st IEEE Computer Security Foundations Symposium.
[8] Dan Boneh,et al. Stronger Password Authentication Using Browser Extensions , 2005, USENIX Security Symposium.
[9] John C. Mitchell,et al. Client-Side Defense Against Web-Based Identity Theft , 2004, NDSS.
[10] H. Kunreuther,et al. You Only Die Once: Managing Discrete Interdependent Risks , 2003 .
[11] Hal R. Varian,et al. System Reliability and Free Riding , 2004, Economics of Information Security.
[12] L. J. Camp. Pricing Security , 2000 .
[13] Tyler Moore,et al. Information Security Economics - and Beyond , 2007, DEON.