Sentry 发表于 2025-3-21 18:49:37
书目名称Decision and Game Theory for Security影响因子(影响力)<br> http://figure.impactfactor.cn/if/?ISSN=BK0264326<br><br> <br><br>书目名称Decision and Game Theory for Security影响因子(影响力)学科排名<br> http://figure.impactfactor.cn/ifr/?ISSN=BK0264326<br><br> <br><br>书目名称Decision and Game Theory for Security网络公开度<br> http://figure.impactfactor.cn/at/?ISSN=BK0264326<br><br> <br><br>书目名称Decision and Game Theory for Security网络公开度学科排名<br> http://figure.impactfactor.cn/atr/?ISSN=BK0264326<br><br> <br><br>书目名称Decision and Game Theory for Security被引频次<br> http://figure.impactfactor.cn/tc/?ISSN=BK0264326<br><br> <br><br>书目名称Decision and Game Theory for Security被引频次学科排名<br> http://figure.impactfactor.cn/tcr/?ISSN=BK0264326<br><br> <br><br>书目名称Decision and Game Theory for Security年度引用<br> http://figure.impactfactor.cn/ii/?ISSN=BK0264326<br><br> <br><br>书目名称Decision and Game Theory for Security年度引用学科排名<br> http://figure.impactfactor.cn/iir/?ISSN=BK0264326<br><br> <br><br>书目名称Decision and Game Theory for Security读者反馈<br> http://figure.impactfactor.cn/5y/?ISSN=BK0264326<br><br> <br><br>书目名称Decision and Game Theory for Security读者反馈学科排名<br> http://figure.impactfactor.cn/5yr/?ISSN=BK0264326<br><br> <br><br>bleach 发表于 2025-3-21 22:08:20
http://reply.papertrans.cn/27/2644/264326/264326_2.pngAVOID 发表于 2025-3-22 00:53:52
http://reply.papertrans.cn/27/2644/264326/264326_3.pngperimenopause 发表于 2025-3-22 08:33:02
http://reply.papertrans.cn/27/2644/264326/264326_4.png表脸 发表于 2025-3-22 12:12:03
Optimal Contracts for Outsourced Computationweaker notion of security, i.e., “lazy-but-honest” contractors. Targeting this type of agents, we develop optimal contracts for outsourcing of computational tasks via appropriate use of rewards, punishments, auditing rate, and “redundancy”. Our contracts provably minimize the expense of the outsourc白杨鱼 发表于 2025-3-22 16:00:45
A Supervisory Control Approach to Dynamic Cyber-Securityamic security problem from the defender’s point of view as a supervisory control problem with imperfect information, modeling the computer network’s operation by a discrete event system. We consider a min-max performance criterion and use dynamic programming to determine, within a restricted set of白杨鱼 发表于 2025-3-22 18:30:13
Numerical Computation of Multi-goal Security Strategiesiple and often interdependent aspects. . are behavior profiles that guarantee some performance . of how the adversary really behaves (provided that it stays within its action set). While security strategies towards a single goal are easy to compute via Nash-equilibria (or refinements thereof), playibifurcate 发表于 2025-3-22 22:48:18
http://reply.papertrans.cn/27/2644/264326/264326_8.png描绘 发表于 2025-3-23 02:23:20
Limiting Adversarial Budget in Quantitative Security Assessmentd by Buldas-Stepanenko in 2012 and improved in 2013 by Buldas and Lenin. In the previously presented models attacker’s budget was assumed to be unlimited. It is natural to assume that the adversarial budget is limited and such an assumption would allow us to model the adversarial decision making mor压倒性胜利 发表于 2025-3-23 06:44:47
http://reply.papertrans.cn/27/2644/264326/264326_10.png