Game-Theoretic Foundations for the Strategic Use of Honeypots in Network Security
暂无分享,去创建一个
Viliam Lisý | Christopher Kiekintveld | Radek Píbil | V. Lisý | Christopher Kiekintveld | Radek Píbil
[1] Angelos D. Keromytis,et al. Countering code-injection attacks with instruction-set randomization , 2003, CCS '03.
[2] King Tak Lee. On a deception game with three boxes , 1993 .
[3] L. Spitzner,et al. Honeypots: Tracking Hackers , 2002 .
[4] J. Nash,et al. NON-COOPERATIVE GAMES , 1951, Classics in Game Theory.
[5] Manish Jain,et al. Computing optimal randomized resource allocations for massive security games , 2009, AAMAS 2009.
[6] Viliam Lisý,et al. Computing Optimal Attack Strategies Using Unconstrained Influence Diagrams , 2013, PAISI.
[7] Xinming Ou,et al. A scalable approach to attack graph generation , 2006, CCS '06.
[8] Branislav Bosanský,et al. Double-oracle algorithm for computing an exact nash equilibrium in zero-sum extensive-form games , 2013, AAMAS.
[9] Richard Lippmann,et al. Practical Attack Graph Generation for Network Defense , 2006, 2006 22nd Annual Computer Security Applications Conference (ACSAC'06).
[10] Sarit Kraus,et al. Deployed ARMOR protection: the application of a game theoretic model for security at the Los Angeles International Airport , 2008, AAMAS 2008.
[11] Giuseppe Persiano,et al. Special Issue on Algorithmic Game Theory , 2013, Theory of Computing Systems.
[12] Joel Spencer,et al. A deception game , 1973 .
[13] Milind Tambe,et al. GUARDS: game theoretic security allocation on a national scale , 2011, AAMAS.
[14] Neil C. Rowe,et al. Defending Cyberspace with Fake Honeypots , 2007, J. Comput..
[15] Ahto Buldas,et al. Upper Bounds for Adversaries' Utility in Attack Trees , 2012, GameSec.
[16] Vincent Conitzer,et al. A double oracle algorithm for zero-sum security games on graphs , 2011, AAMAS.
[17] Tuomas Sandholm,et al. Lossy stochastic game abstraction with bounds , 2012, EC '12.
[18] Milind Tambe,et al. Bayesian Security Games for Controlling Contagion , 2013, 2013 International Conference on Social Computing.
[19] D. Fudenberg,et al. The Theory of Learning in Games , 1998 .
[20] Branislav Bosanský,et al. Game Theoretic Model of Strategic Honeypot Selection in Computer Networks , 2012, GameSec.
[21] Milind Tambe,et al. Security and Game Theory: IRIS – A Tool for Strategic Security Allocation in Transportation Networks , 2011, AAMAS 2011.
[22] Fred Cohen. A Mathematical Structure of Simple Defensive Network Deception , 2000, Comput. Secur..
[23] Viliam Lisý,et al. Computing Optimal Policies for Attack Graphs with Action Failures and Costs , 2014, STAIRS.
[24] Christopher Kiekintveld,et al. Empirical Game-Theoretic Methods for Strategy Design and Analysis in Complex Games , 2007, AAAI.
[25] Yoav Shoham,et al. Multiagent Systems - Algorithmic, Game-Theoretic, and Logical Foundations , 2009 .
[26] Bruce Bueno de Mesquita,et al. An Introduction to Game Theory , 2014 .
[27] Tuomas Sandholm,et al. The State of Solving Large Incomplete-Information Games, and Application to Poker , 2010, AI Mag..
[28] ปิยดา สมบัติวัฒนา. Behavioral Game Theory: Experiments in Strategic Interaction , 2013 .
[29] Bo An,et al. PROTECT: a deployed game theoretic system to protect the ports of the United States , 2012, AAMAS.
[30] Juliane Hahn,et al. Security And Game Theory Algorithms Deployed Systems Lessons Learned , 2016 .
[31] Thorsten Holz,et al. NoSEBrEaK - attacking honeynets , 2004, Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop, 2004..