Using strategy objectives for network security analysis
From MaRDI portal
Publication:3056909
DOI10.1007/978-3-642-16342-5_25zbMATH Open1281.94017OpenAlexW1519558950MaRDI QIDQ3056909FDOQ3056909
Authors: Elie Bursztein, John Mitchell
Publication date: 23 November 2010
Published in: Information Security and Cryptology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-16342-5_25
Recommendations
- A game-theoretic framework for network security vulnerability assessment and mitigation
- Network security. A decision and game-theoretic approach.
- Game theory on attack graph for cyber deception
- Game theoretical security detection strategy for networked systems
- Honeynet games: A game theoretic approach to defending network monitors
Cited In (2)
This page was built for publication: Using strategy objectives for network security analysis
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3056909)