Open Access
MATEC Web of Conferences
Volume 44, 2016
2016 International Conference on Electronic, Information and Computer Engineering
Article Number 01016
Number of page(s) 4
Section Computer, Algorithm, Control and Application Engineering
Published online 08 March 2016
  1. H. Cavusoglu, S. Raghunathan. Configuration of detection software: A comparison of decision and game theory approaches. DATA ANAL Decision Analysis, 1(3): 131–148 (2004). [CrossRef]
  2. H. Cavusoglu, B. Mishra, S. Raghunathan. The value of intrusion detection systems (IDSs) in information technology security. INF SYSTEMS RES, 16 (1): 28–46(2005) [CrossRef]
  3. G. Levitin, K. Hausken. Resource distribution in multiple attacks with imperfect detection of the attack outcome. RISK ANAL, 32 (2): 304–318(2012) [CrossRef]
  4. X. Gao, W. Thong, S. Mei. Security investment and information sharing under an alternative security breach probability function. INF SYST FRONT, 17 (2): 423–438(2013) [CrossRef]
  5. K. Hausken. Information sharing among firms and cyber attacks. J ACCOUNT PUBLIC POL, 26 (6): 639–688(2007) [CrossRef]
  6. J. Zhuang. Impacts of subsidized security on stability and total social costs of equilibrium solutions in an n-player game with errors. ENG ECONOMIST, 55 (2): 131–49(2010) [CrossRef]
  7. T. Alpcan, T. Basar. Network security: A decision and game-theoretic approach. CAMBRIDGE UNIV Press. (2010)
  8. K. C. Nguyen, T. Alpcan, T. Basar. Security games with decision and observation errors. ACC2010 (pp. 510–515). IEEE:(2010)
  9. X. Gao, W. Zhong, S. Mei. A game-theory approach to configuration of detection software with decision errors. RELIAB ENG SYST SAFE, 119, 35–43(2013) [CrossRef]
  10. H. Cavusoglu, S. Raghunathan. Configuration of and interaction between information security technologies: the case of firewalls and intrusion detection systems. INF SYSTEMS RES, 20 (2): 198–217 (2009) [CrossRef]