找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Decision and Game Theory for Security; Second International John S. Baras,Jonathan Katz,Eitan Altman Conference proceedings 2011 Springer-V

[复制链接]
楼主: 不足木
发表于 2025-3-23 12:43:38 | 显示全部楼层
https://doi.org/10.1007/978-981-10-1613-4 of nature. The defense strategies include both actions where security generates positive externalities and actions that do not. When the players are assumed to be risk averse, market insurance enters as a third strategic option. We formulate a one-shot security game with market insurance, character
发表于 2025-3-23 17:26:31 | 显示全部楼层
Equipment and Physical Infrastructure through traditional means such as by using antivirus and antivirus softwares. In reality, an Internet user faces risks due to security attacks as well as risks due to non-security related failures (e.g., reliability faults in the form of hardware crash, buffer overflow, etc.). These risk types are
发表于 2025-3-23 20:19:53 | 显示全部楼层
K. Siddique-e Rabbani,Trevor D. Cradduck within a market and which, if any, become dominant. In this paper, we introduce a model for Dynamic Influence in Competitive Environments (DICE). We show that existing models of influence propagation, including linear threshold and independent cascade models, can be derived as special cases of DICE
发表于 2025-3-24 01:30:07 | 显示全部楼层
Cari Borrás,K. Siddique-e Rabbanin-based service (LBS) with their current coordinates. However, LBS providers collect a significant amount of data from mobile users and could be tempted to misuse it, by compromising a customer’s location privacy (her ability to control the information about her past and present location). Many solu
发表于 2025-3-24 04:36:59 | 显示全部楼层
Dusan Paredes,Marcelo Lufin,Patricio Arocat investigating various aspects of digital trust decisions. Digital trust in online environments differs from its offline variants due to its unique characteristics such as near instantaneous communication, transient and impersonal nature of interactions, immediate access to opinions of others, and
发表于 2025-3-24 10:26:36 | 显示全部楼层
发表于 2025-3-24 13:12:29 | 显示全部楼层
Fernando Rubiera-Morollón,Ana Viñuela’ services based on the extent of privacy that firms are able to provide. Kantarcioglu et.al. (2010) [9] contributes to guidelines for entrepreneurs’ adoption decisions through a novel framework, which combines copula functions and a Stackelberg leader-follower game with consumers taking the role of
发表于 2025-3-24 18:18:18 | 显示全部楼层
https://doi.org/10.1007/978-94-011-3346-3ion links. In this regard, the security of individual nodes depend not only on their own efforts, but also on the efforts and underlying connectivity structure of neighboring network nodes. By the term ‘effort’, we imply the amount of investments made by a user in security mechanisms like antivirus
发表于 2025-3-24 21:30:21 | 显示全部楼层
发表于 2025-3-25 00:59:18 | 显示全部楼层
978-3-642-25279-2Springer-Verlag GmbH Berlin Heidelberg 2011
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-1 11:22
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表