A game theoretic defence framework against DoS/DDoS cyber attacks
暂无分享,去创建一个
Theodore Tryfonas | George C. Oikonomou | Theodoros Spyridopoulos | G. Karanikas | Theodoros Spyridopoulos | G. Karanikas | T. Tryfonas | G. Oikonomou
[1] Theodore Tryfonas,et al. A Qualitative Approach to Information Availability , 2000, SEC.
[2] E. Eugene Schultz. A framework for understanding and predicting insider attacks , 2002, Comput. Secur..
[3] Wang Gui-juan. Denial of Service and Defence , 2003 .
[4] Martin J. Osborne,et al. An Introduction to Game Theory , 2003 .
[5] Eddie Kohler,et al. Internet research needs better models , 2003, CCRV.
[6] Steve Greenberg,et al. Best Practices for Data Centers: Lessons Learned from Benchmarking 22 Data Centers , 2006 .
[7] Giannis F. Marias,et al. SIP Vulnerabilities and Anti-SPIT Mechanisms Assessment , 2007, 2007 16th International Conference on Computer Communications and Networks.
[8] Jonathan Matusitz,et al. A Postmodern Theory of Cyberterrorism: Game Theory , 2009, Inf. Secur. J. A Glob. Perspect..
[9] Jin-Cherng Lin,et al. A Game Theoretic Approach to Decision and Analysis in Strategies of Attack and Defense , 2009, 2009 Third IEEE International Conference on Secure Software Integration and Reliability Improvement.
[10] Nirwan Ansari,et al. Is it congestion or a DDoS attack? , 2009, IEEE Communications Letters.
[11] Haining Wang,et al. Profit-aware overload protection in E-commerce Web sites , 2009, J. Netw. Comput. Appl..
[12] Chase Qishi Wu,et al. On modeling and simulation of game theory-based defense mechanisms against DoS and DDoS attacks , 2010, SpringSim.
[13] Dimitris Gritzalis,et al. An Insider Threat Prediction Model , 2010, TrustBus.
[14] Mehran S. Fallah. A Puzzle-Based Defense Strategy Against Flooding Attacks Using Game Theory , 2010, IEEE Transactions on Dependable and Secure Computing.
[15] Sankardas Roy,et al. Game theory-based defense mechanisms against DDoS attacks on TCP/TCP-friendly flows , 2011, 2011 IEEE Symposium on Computational Intelligence in Cyber Security (CICS).
[16] Dimitris Gritzalis,et al. Formal analysis for robust anti-SPIT protection using model checking , 2012, International Journal of Information Security.