Indices of power in optimal IDS default configuration: theory and examples
DOI10.1007/978-3-642-25280-8_3zbMATH Open1349.68018arXiv1110.1862OpenAlexW1525862211MaRDI QIDQ3098091FDOQ3098091
Authors: Quanyan Zhu, Tamer Başar
Publication date: 11 November 2011
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://arxiv.org/abs/1110.1862
Recommendations
- A game theoretical model for optimal distribution of network security resources
- Inspection game analysis of intrusion prevention system management and configuration
- The management of intrusion detection: Configuration, inspection, and investment
- scientific article; zbMATH DE number 1979438
- A multi-objective optimisation approach to IDS sensor placement
Combinatorial optimization (90C27) Cooperative games (91A12) Applications of game theory (91A80) Network design and communication in computer systems (68M10)
Cites Work
Cited In (8)
- A multi-objective optimisation approach to IDS sensor placement
- Title not available (Why is that?)
- Title not available (Why is that?)
- Towards an information-theoretic framework for analyzing intrusion detection systems
- The management of intrusion detection: Configuration, inspection, and investment
- Inspection game analysis of intrusion prevention system management and configuration
- A game theoretical model for optimal distribution of network security resources
- Optimizing intrusion detection systems placement against network virus spreading using a partially observable stochastic minimum-threat path game
Uses Software
This page was built for publication: Indices of power in optimal IDS default configuration: theory and examples
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3098091)