Game Theory Basics and Its Application in Cyber Security
暂无分享,去创建一个
Ikerionwu Charles | Amadi Emmanuel Chukwudi | E. Udoka | Ikerionwu Charles | Amadi Emmanuuel Chukwudi | Eze Udoka
[1] Murali S. Kodialam,et al. Detecting network intrusions via sampling: a game theoretic approach , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[2] Yu Liu,et al. Modelling misbehaviour in ad hoc networks: a game theoretic approach for intrusion detection , 2006, Int. J. Secur. Networks.
[3] Chase Qishi Wu,et al. A Survey of Game Theory as Applied to Network Security , 2010, 2010 43rd Hawaii International Conference on System Sciences.
[4] Paul F. Syverson,et al. A different look at secure distributed computation , 1997, Proceedings 10th Computer Security Foundations Workshop.
[5] G. Manimaran,et al. Internet infrastructure security: a taxonomy , 2002, IEEE Netw..
[6] Jeannette M. Wing,et al. Game strategies in network security , 2005, International Journal of Information Security.
[7] M. Sridharan,et al. ESSENTIALS OF GAME THEORY , 2007 .
[8] Assane Gueye,et al. A Game Theoretical Approach to Communication Security , 2011 .
[9] Samuel N. Hamilton,et al. Challenges in Applying Game Theory to the Domain of Information Warfare , 2001 .
[10] Maryam Mohi,et al. A Game Theory Based Approach for Security in Wireless Sensor Networks , 2008 .
[11] S. Stubberud,et al. FRIARS: a feedback control system for information assurance using a Markov decision process , 2001, Proceedings IEEE 35th Annual 2001 International Carnahan Conference on Security Technology (Cat. No.01CH37186).
[12] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.
[13] Chris Hankin,et al. Game Theory Meets Information Security Management , 2014, SEC.
[14] Peter Reiher,et al. A taxonomy of DDoS attack and DDoS defense mechanisms , 2004, CCRV.
[15] Joao P. Hespanha,et al. Preliminary results in routing games , 2001, Proceedings of the 2001 American Control Conference. (Cat. No.01CH37148).
[16] J. Nash. Equilibrium Points in N-Person Games. , 1950, Proceedings of the National Academy of Sciences of the United States of America.
[17] Hua Li,et al. Distributed Intrusion Detection System Based on BP Neural Network , 2009, 2009 International Conference on Computational Intelligence and Software Engineering.
[18] T. Basar,et al. A game theoretic approach to decision and analysis in network intrusion detection , 2003, 42nd IEEE International Conference on Decision and Control (IEEE Cat. No.03CH37475).