共 50 条
- [1] A supply chain network game theory model of cybersecurity investments with nonlinear budget constraints [J]. Annals of Operations Research, 2017, 248 : 405 - 427
- [3] Research on the Project Supervision Game Model Based on the Information Asymmetry Theory [J]. 2009 IEEE 16TH INTERNATIONAL CONFERENCE ON INDUSTRIAL ENGINEERING AND ENGINEERING MANAGEMENT, VOLS 1 AND 2, PROCEEDINGS, 2009, : 486 - +
- [4] A Coalitional Game Theory Approach for Cybersecurity Information Sharing [J]. MILCOM 2017 - 2017 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM), 2017, : 237 - 242
- [5] Game Theory for Privacy-Preserving Cybersecurity Information Exchange Framework [J]. 2024 IEEE 21ST CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE, CCNC, 2024, : 730 - 735
- [6] Optimal Cybersecurity Investments for SIS Model [J]. 2020 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2020,
- [7] A game theory based cybersecurity assessment model for advanced manufacturing systems [J]. 46TH SME NORTH AMERICAN MANUFACTURING RESEARCH CONFERENCE, NAMRC 46, 2018, 26 : 1255 - 1264
- [8] N-Player Cybersecurity Game Theory Model in Power Grids [J]. 2023 NORTH AMERICAN POWER SYMPOSIUM, NAPS, 2023,
- [9] GTM: Game Theoretic Methodology for optimal cybersecurity defending strategies and investments [J]. PROCEEDINGS OF THE 17TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, ARES 2022, 2022,