Research on Decision of Cyber Security Investment Based on Evolutionary Game Model
暂无分享,去创建一个
[1] Michael M. May,et al. How much is enough? A risk management approach to computer security , 2000 .
[2] Gustavus J. Simmons,et al. Cryptanalysis and protocol failures , 1994, CACM.
[3] Qiu Wan-hua,et al. An Analysis of Games of Information Security Investment Based on Interdependent Security , 2006 .
[4] Deborah A. Frincke,et al. Balancing cooperation and risk in intrusion detection , 2000, TSEC.
[5] Catherine A. Meadows,et al. A Cost-Based Framework for Analysis of Denial of Service Networks , 2001, J. Comput. Secur..
[6] Stefan Axelsson,et al. The base-rate fallacy and the difficulty of intrusion detection , 2000, TSEC.
[7] Lawrence A. Gordon,et al. The economics of information security investment , 2002, TSEC.
[8] Stuart E. Schechter,et al. Quantitatively Differentiating System Security , 2002 .
[9] James P Anderson,et al. Computer Security Technology Planning Study , 1972 .
[10] Simon R. Wiseman,et al. A Secure Capability Computer System , 1986, 1986 IEEE Symposium on Security and Privacy.
[11] Giovanni Vigna,et al. NetSTAT: A Network-based Intrusion Detection System , 1999, J. Comput. Secur..
[12] Huseyin Cavusoglu,et al. Model for Evaluating , 2022 .