A Game-Theoretic Analysis of Deception over Social Networks Using Fake Avatars
暂无分享,去创建一个
Quanyan Zhu | Mohammad Hossein Manshaei | Amin Mohammadi | Monireh Mohebbi Moghaddam | M. Manshaei | Quanyan Zhu | M. M. Moghaddam | Amin Mohammadi
[1] R. Gibbons. Game theory for applied economists , 1992 .
[2] Sean B. Maynard,et al. Information security strategies: towards an organizational multi-strategy perspective , 2014, J. Intell. Manuf..
[3] Cristina Comaniciu,et al. A Bayesian game approach for intrusion detection in wireless ad hoc networks , 2006, GameNets '06.
[4] Eitan Altman,et al. Signaling game-based approach to power control management in wireless networks , 2013, PM2HW2N '13.
[5] Oscar Serrano Serrano,et al. Changing the game: The art of deceiving sophisticated attackers , 2014, 2014 6th International Conference On Cyber Conflict (CyCon 2014).
[6] Jung-Min Park,et al. A Game Theoretic Formulation for Intrusion Detection in Mobile Ad Hoc Networks , 2006, Int. J. Netw. Secur..
[7] Quanyan Zhu,et al. Deployment and exploitation of deceptive honeybots in social networks , 2012, 52nd IEEE Conference on Decision and Control.
[8] Quanyan Zhu,et al. Deception by Design: Evidence-Based Signaling Games for Network Defense , 2015, WEIS.
[9] Yoav Shoham,et al. Multiagent Systems - Algorithmic, Game-Theoretic, and Logical Foundations , 2009 .
[10] Yuanjie Li,et al. Signaling game based strategy of intrusion detection in wireless sensor networks , 2011, Comput. Math. Appl..
[11] Jonathan M. Spring,et al. Cyber Security via Signaling Games: Toward a Science of Cyber Security , 2014, ICDCIT.
[12] Mohammed H. Almeshekah,et al. Planning and Integrating Deception into Computer Security Defenses , 2014, NSPW '14.
[13] Quanyan Zhu,et al. Deceptive Routing in Relay Networks , 2012, GameSec.
[14] Apostolis Zarras,et al. The art of false alarms in the game of deception: Leveraging fake honeypots for enhanced security , 2014, 2014 International Carnahan Conference on Security Technology (ICCST).
[15] Daniel Grosu,et al. A Game Theoretic Investigation of Deception in Network Security , 2009, ICCCN.
[16] Ahmad Khademzadeh,et al. A theoretical signaling game model for intrusion detection in wireless sensor networks , 2010, 2010 14th International Telecommunications Network Strategy and Planning Symposium (NETWORKS).
[17] Quanyan Zhu,et al. Deceptive routing games , 2012, 2012 IEEE 51st IEEE Conference on Decision and Control (CDC).
[18] Peng Liu,et al. Using Signaling Games to Model the Multi-step Attack-Defense Scenarios on Confidentiality , 2012, GameSec.
[19] Quanyan Zhu,et al. Flip the Cloud: Cyber-Physical Signaling Games in the Presence of Advanced Persistent Threats , 2015, GameSec.
[20] Quanyan Zhu,et al. To Trust or Not: A Security Signaling Game Between Service Provider and Client , 2015, GameSec.
[21] Richard Weber,et al. Online phishing classification using adversarial data mining and signaling games , 2010, SKDD.
[22] Wei Wang,et al. Detecting Targeted Attacks By Multilayer Deception , 2013, J. Cyber Secur. Mobil..
[23] Ehab Al-Shaer,et al. A game-theoretic approach for deceiving Remote Operating System Fingerprinting , 2013, 2013 IEEE Conference on Communications and Network Security (CNS).