Information Security Game Analysis with Penalty Parameter
暂无分享,去创建一个
Wei Sun | Xingang You | Xiangwei Kong | Dequan He | Xiangwei Kong | Xingang You | Wei Sun | Dequan He
[1] Huseyin Cavusoglu,et al. Model for Evaluating , 2022 .
[2] Joseph Y. Halpern. A computer scientist looks at game theory , 2002, Games Econ. Behav..
[3] Stefan Biffl,et al. Business Process-based Valuation of IT-Security , 2005 .
[4] Samuel N. Hamilton,et al. The Role of Game Theory in Information Warfare , 2002 .
[5] Ross J. Anderson. Why information security is hard - an economic perspective , 2001, Seventeenth Annual Computer Security Applications Conference.
[6] H. Kunreuther,et al. Interdependent Security , 2003 .
[7] Kenneth J. Arrow. Introductory remarks on the history of game theory , 2003, Games Econ. Behav..
[8] Hal R. Varian,et al. System Reliability and Free Riding , 2004, Economics of Information Security.