A dynamic Bayesian security game framework for strategic defense mechanism design

被引:14
|
作者
机构
[1] Farhang, Sadegh
[2] Manshaei, Mohammad Hossein
[3] Esfahani, Milad Nasr
[4] Zhu, Quanyan
来源
Farhang, Sadegh | 1600年 / Springer Verlag卷 / 8840期
关键词
D O I
10.1007/978-3-319-12601-2_18
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [31] STRATEGIC DEFENSE AND THE GERMAN-AMERICAN SECURITY CONNECTION
    HANRIEDER, WF
    JOURNAL OF INTERNATIONAL AFFAIRS, 1988, 41 (02) : 247 - 268
  • [32] Strategic Defense and Attack in Deception based Network Security
    Fraunholz, Daniel
    Schotten, Hans Dieter
    2018 32ND INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN), 2018, : 156 - 161
  • [33] Dynamic Game based Security framework in SDN-enabled Cloud Networking Environments
    Chowdhary, Ankur
    Pisharody, Sandeep
    Alshamrani, Adel
    Huang, Dijiang
    SDN-NFVSEC'17: PROCEEDINGS OF THE ACM INTERNATIONAL WORKSHOP ON SECURITY IN SOFTWARE DEFINED NETWORKS & NETWORK FUNCTION VIRTUALIZATION, 2017, : 53 - 58
  • [34] Dynamic Authentication Mechanism Research and Security Protocol Design of HIOT
    Mao, Rui
    Ji, Heming
    Wang, Xiaoyu
    2022 27TH IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (IEEE ISCC 2022), 2022,
  • [35] Bayesian truthing and experimental validation in homeland security and defense
    Jannson, Tomasz
    Forrester, Thomas
    Wang, Wenjian
    Kostrzewski, Andrew
    Pradhan, Ranjit
    SENSORS, AND COMMAND, CONTROL, COMMUNICATIONS, AND INTELLIGENCE (C3I) TECHNOLOGIES FOR HOMELAND SECURITY AND HOMELAND DEFENSE XIII, 2014, 9074
  • [36] Towards a Framework for Strategic Security Context in Information Security Governance
    Maynard, Sean B.
    Tan, Terrence
    Ahmad, Atif
    Ruighaver, Tobias
    PACIFIC ASIA JOURNAL OF THE ASSOCIATION FOR INFORMATION SYSTEMS, 2018, 10 (04): : 65 - 88
  • [37] A Framework of Camera Source Identification Bayesian Game
    Zeng, Hui
    Liu, Jingxian
    Yu, Jingjing
    Kang, Xiangui
    Shi, Yun Qing
    Wang, Z. Jane
    IEEE TRANSACTIONS ON CYBERNETICS, 2017, 47 (07) : 1757 - 1768
  • [38] Incentive Mechanism Design Based on Repeated Game Theory in Security Information Sharing
    Xiong Qiang
    Chen Xiaoyan
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON SCIENCE AND SOCIAL RESEARCH (ICSSR 2013), 2013, 64 : 399 - 401
  • [39] Double closed-loop NCSs modeling for security control and a defense framework design
    Ge, Hui
    Yue, Dong
    Xie, Xiang-peng
    Deng, Song
    Yang, Yang
    Yang, Ji-quan
    PROCEEDINGS OF THE 36TH CHINESE CONTROL CONFERENCE (CCC 2017), 2017, : 7777 - 7782
  • [40] Bayesian Mechanism Design
    Hartline, Jason D.
    FOUNDATIONS AND TRENDS IN THEORETICAL COMPUTER SCIENCE, 2012, 8 (03): : 143 - 263