共 50 条
- [1] A Game-theoretic Analysis of Hybrid Threats [J]. DEFENCE AND PEACE ECONOMICS, 2022, 33 (01) : 26 - 41
- [2] Game Theoretic Analysis of Security and Sustainability [J]. PROCEEDINGS OF THE TWENTY-SIXTH INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE, 2017, : 5111 - 5115
- [4] A game theoretic approach to cyber security risk management [J]. JOURNAL OF DEFENSE MODELING AND SIMULATION-APPLICATIONS METHODOLOGY TECHNOLOGY-JDMS, 2018, 15 (02): : 127 - 145
- [5] Threats analysis and security analysis for Critical Infrastructures: Risk analysis vs. Game theory. [J]. 2018 52ND ANNUAL IEEE INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY (ICCST), 2018, : 172 - 176
- [6] Game-Theoretic Security Analysis of Quantum Networks [J]. ICQNM 2009: THIRD INTERNATIONAL CONFERENCE ON QUANTUM, NANO AND MICRO TECHNOLOGIES: PROCEEDINGS, 2009, : 20 - 25
- [8] Game Theoretic Modeling of Insider Threats in an Organization [J]. APPLIED CRYPTOGRAPHY AND NETWORK SECURITY WORKSHOPS, PT II, ACNS 2024-AIBLOCK 2024, AIHWS 2024, AIOTS 2024, SCI 2024, AAC 2024, SIMLA 2024, LLE 2024, AND CIMSS 2024, 2024, 14587 : 188 - 192
- [9] Game-theoretic computing in risk analysis [J]. WILEY INTERDISCIPLINARY REVIEWS-COMPUTATIONAL STATISTICS, 2012, 4 (03): : 227 - 248
- [10] Fuzzy risk analysis of computer security threats [J]. 2005 International Symposium on Computer Science and Technology, Proceedings, 2005, : 1 - 8