暂无分享,去创建一个
[1] M. Dufwenberg. Game theory. , 2011, Wiley interdisciplinary reviews. Cognitive science.
[2] Jonathan M. Spring,et al. Cyber Security via Signaling Games: Toward a Science of Cyber Security , 2014, ICDCIT.
[3] Oguzhan Alagöz,et al. Modeling secrecy and deception in a multiple-period attacker-defender signaling game , 2010, Eur. J. Oper. Res..
[4] Herbert Bos,et al. Argos: an emulator for fingerprinting zero-day attacks for advertised honeypots with automatic signature generation , 2006, EuroSys.
[5] Radha Poovendran,et al. AMOEBA: Robust Location Privacy Scheme for VANET , 2007, IEEE Journal on Selected Areas in Communications.
[6] J. Nash. Equilibrium Points in N-Person Games. , 1950, Proceedings of the National Academy of Sciences of the United States of America.
[7] Ronald L. Rivest,et al. FlipIt: The Game of “Stealthy Takeover” , 2012, Journal of Cryptology.
[8] Richard M. Murray,et al. Feedback Systems: An Introduction for Scientists and Engineers , 2008 .
[9] Quanyan Zhu,et al. Deception by Design: Evidence-Based Signaling Games for Network Defense , 2015, WEIS.
[10] Ronald L. Rivest,et al. Defending against the Unknown Enemy: Applying FlipIt to System Security , 2012, GameSec.
[11] Daniel Grosu,et al. A Game Theoretic Investigation of Deception in Network Security , 2009, 2009 Proceedings of 18th International Conference on Computer Communications and Networks.
[12] Pieter Abbeel,et al. Image Object Label 3 D CAD Model Candidate Grasps Google Object Recognition Engine Google Cloud Storage Select Feasible Grasp with Highest Success Probability Pose EstimationCamera Robots Cloud 3 D Sensor , 2014 .
[13] Quanyan Zhu,et al. A Dynamic Bayesian Security Game Framework for Strategic Defense Mechanism Design , 2014, GameSec.
[14] Colin Tankard,et al. Advanced Persistent threats and how to monitor and deter them , 2011, Netw. Secur..
[15] R. Poovendran,et al. CARAVAN: Providing Location Privacy for VANET , 2005 .
[16] Singh Ghuman,et al. Cloud Computing-A Study of Infrastructure as a Service , 2015 .