Mapping between Classical Risk Management and Game Theoretical Approaches
暂无分享,去创建一个
[1] Gary Stoneburner,et al. SP 800-30. Risk Management Guide for Information Technology Systems , 2002 .
[2] Joel Watson,et al. Strategy : An Introduction to Game Theory , 2001 .
[3] Jason Edwin Stamp,et al. A classification scheme for risk assessment methods. , 2004 .
[4] G. Stoneburner,et al. Risk Management Guide for Information Technology Systems: Recommendations of the National Institute of Standards and Technology , 2002 .
[5] Jr. Louis Anthony Cox,et al. Game Theory and Risk Analysis , 2009 .
[6] K. Hausken. Probabilistic Risk Analysis and Game Theory , 2002, Risk analysis : an official publication of the Society for Risk Analysis.
[7] Peng Liu,et al. Incentive-based modeling and inference of attacker intent, objectives, and strategies , 2003, CCS '03.
[8] Ronald D. Fricker,et al. Game Theory in an Age of Terrorism: How Can Statisticians Contribute? , 2006 .
[9] Ketil Stølen,et al. A Guided Tour of the CORAS Method , 2011 .
[10] Tyler Moore,et al. Information Security Economics - and Beyond , 2007, DEON.
[11] E. Rasmusen. Games and Information: An Introduction to Game Theory , 2006 .
[12] Lawrence Carin,et al. Cybersecurity Strategies: The QuERIES Methodology , 2008, Computer.
[13] Jorma Jormakka,et al. Modelling Information Warfare as a Game , 2005 .
[14] Alexander M. Millkey. The Black Swan: The Impact of the Highly Improbable , 2009 .
[15] FRamewoRk exceRpT. The Risk IT Framework , 2010 .
[16] Chase Qishi Wu,et al. A Survey of Game Theory as Applied to Network Security , 2010, 2010 43rd Hawaii International Conference on System Sciences.
[17] M. Dufwenberg. Game theory. , 2011, Wiley interdisciplinary reviews. Cognitive science.
[18] Les Labuschagne,et al. A framework for comparing different information security risk analysis methodologies , 2005 .
[19] Marshall F Chalverus,et al. The Black Swan: The Impact of the Highly Improbable , 2007 .
[20] Lawrence Carin,et al. Cybersecurity The QuERIES Methodology , 2008 .