Empirical Game-Theoretic Analysis of an Adaptive Cyber-Defense Scenario (Preliminary Report)
暂无分享,去创建一个
[1] William W. Streilein,et al. Finding Focus in the Blur of Moving-Target Techniques , 2014, IEEE Security & Privacy.
[2] Andrew McLennan,et al. Gambit: Software Tools for Game Theory , 2006 .
[3] Tie-Yan Liu,et al. Web and Internet Economics , 2014, Lecture Notes in Computer Science.
[4] Aron Laszka,et al. Mitigating Covert Compromises - A Game-Theoretic Model of Targeted and Non-Targeted Covert Attacks , 2013, WINE.
[5] Shari Lawrence Pfleeger,et al. Analyzing Computer Security - A Threat / Vulnerability / Countermeasure Approach , 2012 .
[6] Carlos Cid,et al. Are We Compromised? Modelling Security Assessment Games , 2012, GameSec.
[7] Aron Laszka,et al. Mitigation of Targeted and Non-targeted Covert Attacks as a Timing Game , 2013, GameSec.
[8] John S. Baras,et al. Decision and Game Theory for Security , 2010, Lecture Notes in Computer Science.
[9] Anh Nguyen-Tuong,et al. Effectiveness of Moving Target Defenses , 2011, Moving Target Defense.
[10] Michael P. Wellman,et al. Strategic Modeling of Information Sharing among Data Privacy Attackers , 2010, Informatica.
[11] Michael P. Wellman. Methods for Empirical Game-Theoretic Analysis , 2006, AAAI.
[12] D. Knuth,et al. A note on strategy elimination in bimatrix games , 1988 .
[13] Michael P. Wellman,et al. Methods for empirical game-theoretic analysis (extended abstract) , 2006 .
[14] Sushil Jajodia,et al. Moving Target Defense - Creating Asymmetric Uncertainty for Cyber Threats , 2011, Moving Target Defense.
[15] Michael P. Wellman,et al. Analyzing Incentives for Protocol Compliance in Complex Domains: A Case Study of Introduction-Based Routing , 2013, ArXiv.
[16] Ronald L. Rivest,et al. FlipIt: The Game of “Stealthy Takeover” , 2012, Journal of Cryptology.
[17] Michael P. Wellman,et al. Iterated Weaker-than-Weak Dominance , 2007, IJCAI.
[18] Gábor Horváth,et al. FlipThem: Modeling Targeted Attacks with FlipIt for Multiple Resources , 2014, GameSec.