A Game Theoretic Software Test-bed for Cyber Security Analysis of Critical Infrastructure
暂无分享,去创建一个
[1] Dipankar Dasgupta,et al. Game theory for cyber security , 2010, CSIIRW '10.
[2] Colin Camerer,et al. Experience‐weighted Attraction Learning in Normal Form Games , 1999 .
[3] Teodor Sommestad,et al. Cyber Security Exercises and Competitions as a Platform for Cyber Security Experiments , 2012, NordSec.
[4] Anamika Yadav,et al. Performance analysis of NSL-KDD dataset using ANN , 2015, 2015 International Conference on Signal Processing and Communication Engineering Systems.
[5] Gregory Levitin,et al. Optimal network protection against diverse interdictor strategies , 2011, Reliab. Eng. Syst. Saf..
[6] Vicki M. Bier,et al. Secrecy in Defensive Allocations as a Strategy for Achieving More Cost-Effec tive Att acker Dett errence , 2009 .
[7] Qishi Wu,et al. A Stochastic Game Model with Imperfect Information in Cyber Security , 2010 .
[8] Larry Samuelson,et al. Choosing What to Protect: Strategic Defensive Allocation Against an Unknown Attacker , 2005 .
[9] Alexander Kott,et al. Cyber-security of SCADA and Other Industrial Control Systems , 2016, Advances in Information Security.
[10] Marcelo Masera,et al. Using an Emulation Testbed for Operational Cyber Security Exercises , 2011, Critical Infrastructure Protection.
[11] D. Vijay Rao,et al. A Game Theoretic Approach to Modelling Jamming Attacks in Delay Tolerant Networks , 2017 .
[12] Chase Qishi Wu,et al. A Survey of Game Theory as Applied to Network Security , 2010, 2010 43rd Hawaii International Conference on System Sciences.
[13] T. Basar,et al. A game theoretic analysis of intrusion detection in access control systems , 2004, 2004 43rd IEEE Conference on Decision and Control (CDC) (IEEE Cat. No.04CH37601).
[14] Glenn Shafer,et al. Readings in Uncertain Reasoning , 1990 .
[15] Pei-Yu Chen,et al. Maximization of Multi-Round Network Survivability under Considerations of the Defender's Defensive Messaging Strategies , 2013, 2013 International Conference on MOBILe Wireless MiddleWARE, Operating Systems, and Applications.