Open Access
Issue |
MATEC Web of Conferences
Volume 44, 2016
2016 International Conference on Electronic, Information and Computer Engineering
|
|
---|---|---|
Article Number | 01016 | |
Number of page(s) | 4 | |
Section | Computer, Algorithm, Control and Application Engineering | |
DOI | https://doi.org/10.1051/matecconf/20164401016 | |
Published online | 08 March 2016 |
- H. Cavusoglu, S. Raghunathan. Configuration of detection software: A comparison of decision and game theory approaches. DATA ANAL Decision Analysis, 1(3): 131–148 (2004). [Google Scholar]
- H. Cavusoglu, B. Mishra, S. Raghunathan. The value of intrusion detection systems (IDSs) in information technology security. INF SYSTEMS RES, 16 (1): 28–46(2005) [CrossRef] [Google Scholar]
- G. Levitin, K. Hausken. Resource distribution in multiple attacks with imperfect detection of the attack outcome. RISK ANAL, 32 (2): 304–318(2012) [CrossRef] [Google Scholar]
- X. Gao, W. Thong, S. Mei. Security investment and information sharing under an alternative security breach probability function. INF SYST FRONT, 17 (2): 423–438(2013) [CrossRef] [Google Scholar]
- K. Hausken. Information sharing among firms and cyber attacks. J ACCOUNT PUBLIC POL, 26 (6): 639–688(2007) [CrossRef] [Google Scholar]
- J. Zhuang. Impacts of subsidized security on stability and total social costs of equilibrium solutions in an n-player game with errors. ENG ECONOMIST, 55 (2): 131–49(2010) [CrossRef] [Google Scholar]
- T. Alpcan, T. Basar. Network security: A decision and game-theoretic approach. CAMBRIDGE UNIV Press. (2010) [Google Scholar]
- K. C. Nguyen, T. Alpcan, T. Basar. Security games with decision and observation errors. ACC2010 (pp. 510–515). IEEE:(2010) [Google Scholar]
- X. Gao, W. Zhong, S. Mei. A game-theory approach to configuration of detection software with decision errors. RELIAB ENG SYST SAFE, 119, 35–43(2013) [CrossRef] [Google Scholar]
- H. Cavusoglu, S. Raghunathan. Configuration of and interaction between information security technologies: the case of firewalls and intrusion detection systems. INF SYSTEMS RES, 20 (2): 198–217 (2009) [CrossRef] [Google Scholar]
Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.
Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.
Initial download of the metrics may take a while.