Game Theory for Security
暂无分享,去创建一个
[1] John S. Baras,et al. Decision and Game Theory for Security , 2010, Lecture Notes in Computer Science.
[2] N. Bambos,et al. Security investment games of interdependent organizations , 2008, 2008 46th Annual Allerton Conference on Communication, Control, and Computing.
[3] Sajal K. Das,et al. gPath: A Game-Theoretic Path Selection Algorithm to Protect Tor's Anonymity , 2010, GameSec.
[4] Tansu Alpcan,et al. Network Security , 2010 .
[5] Tansu Alpcan,et al. Adversarial behavior in network mechanism design , 2011, VALUETOOLS.
[6] Aaron Roth,et al. The Price of Malice in Linear Congestion Games , 2008, WINE.
[7] Murat Kantarcioglu,et al. Investment in Privacy-Preserving Technologies under Uncertainty , 2011, GameSec.
[8] R. Srikant,et al. Correlated Jamming on MIMO Gaussian Fading Channels , 2004, IEEE Trans. Inf. Theory.
[9] Christopher Leckie,et al. Using Virtual Machine Allocation Policies to Defend against Co-Resident Attacks in Cloud Computing , 2017, IEEE Transactions on Dependable and Secure Computing.
[10] Jean C. Walrand,et al. Design of Network Topology in an Adversarial Environment , 2010, GameSec.
[11] Krzysztof Szajowski. Multi-variate Quickest Detection of Significant Change Process , 2011, GameSec.
[12] Quanyan Zhu,et al. Game theory meets network security and privacy , 2013, CSUR.
[13] Rong Yang,et al. Improving resource allocation strategies against human adversaries in security games: An extended study , 2013, Artif. Intell..
[14] Jean-Pierre Hubaux,et al. Security and Cooperation in Wireless Networks , 2007, ESAS.
[15] Murali S. Kodialam,et al. Detecting network intrusions via sampling: a game theoretic approach , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[16] M. Naceur Azaiez,et al. Game Theoretic Risk Analysis of Security Threats , 2009 .
[17] Tansu Alpcan,et al. Dynamic Control and Mitigation of Interdependent IT Security Risks , 2010, 2010 IEEE International Conference on Communications.
[18] Sarit Kraus,et al. Using Game Theory for Los Angeles Airport Security , 2009, AI Mag..
[19] Jens Zander,et al. Jamming games in slotted Aloha packet radio networks , 1990, IEEE Conference on Military Communications.
[20] Seth D. Guikema,et al. Game Theory Models of Intelligent Actors in Reliability Analysis: An Overview of the State of the Art , 2009 .
[21] Marimuthu Palaniswami,et al. Security games for voltage control in smart grid , 2012, 2012 50th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[22] Eitan Altman,et al. Adversarial Control in a Delay Tolerant Network , 2010, GameSec.
[23] Milind Tambe,et al. Security and Game Theory - Algorithms, Deployed Systems, Lessons Learned , 2011 .