找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Decision and Game Theory for Security; First International Tansu Alpcan,Levente Buttyán,John S. Baras Conference proceedings 2010 Springer

[复制链接]
楼主: Monsoon
发表于 2025-3-28 18:14:10 | 显示全部楼层
发表于 2025-3-28 19:10:30 | 显示全部楼层
发表于 2025-3-28 23:16:30 | 显示全部楼层
发表于 2025-3-29 05:16:57 | 显示全部楼层
Optimal Information Security Investment with Penetration Testingurity practitioners. This paper adds penetration testing to the realm of information security investment. Penetration testing is modeled as an information gathering option to reduce uncertainty in a discrete time, finite horizon, player-versus-nature, weakest-link security game. We prove that once s
发表于 2025-3-29 07:33:35 | 显示全部楼层
发表于 2025-3-29 14:16:22 | 显示全部楼层
gPath: A Game-Theoretic Path Selection Algorithm to Protect Tor’s Anonymityhe problem as a repeated non-cooperative game between the defender and the adversary (i.e., controller of the compromised Tor nodes to carry out entry-exit linking attacks). Given the current path selection algorithm of Tor, we derive an optimal attack strategy for the adversary according to its uti
发表于 2025-3-29 16:54:13 | 显示全部楼层
When Do Firms Invest in Privacy-Preserving Technologies?privacy that firms are able to provide, for example, the use of certain banking services, health care information technology [7]...etc. Firms thus face crucial assessment of investment on privacy-preserving technologies. Two important factors affect firms’ valuation: (1) a customer’s valuation of hi
发表于 2025-3-29 23:12:15 | 显示全部楼层
Adversarial Control in a Delay Tolerant Networksource’s objective is to choose transmission probabilities so as to maximize the probability of successful delivery of some content to the destination within a deadline. These transmissions are subject to interference from a jammer who is a second, adversarial type controller, We solve three variant
发表于 2025-3-30 02:48:49 | 显示全部楼层
Security Interdependencies for Networked Control Systems with Identical Agentsced risks. Each plant is modeled by a discrete-time stochastic linear system, which is sensed and controlled over a communication network. We model security decisions of the individual systems (also called players) as a game. We consider a two-stage game, in which first, the players choose whether t
发表于 2025-3-30 04:54:53 | 显示全部楼层
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-25 23:51
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表