Security Games with Market Insurance (Englisch)
- Neue Suche nach: Johnson, B.
- Neue Suche nach: Bohme, R.
- Neue Suche nach: Grossklags, J.
- Neue Suche nach: Johnson, B.
- Neue Suche nach: Bohme, R.
- Neue Suche nach: Grossklags, J.
- Neue Suche nach: Baras, J.S.
- Neue Suche nach: Katz, J.
- Neue Suche nach: Altman, E.
In:
Decision and game theory for security
7037
;
117-130
;
2011
-
ISBN:
-
ISSN:
- Aufsatz (Konferenz) / Print
-
Titel:Security Games with Market Insurance
-
Beteiligte:Johnson, B. ( Autor:in ) / Bohme, R. ( Autor:in ) / Grossklags, J. ( Autor:in ) / Baras, J.S. / Katz, J. / Altman, E.
-
Kongress:International Conference; 2nd, Decision and game theory for security ; 2011 ; College Park, MD
-
Erschienen in:Decision and game theory for security , 7037 ; 117-130LECTURE NOTES IN COMPUTER SCIENCE , 7037 ; 117-130
-
Verlag:
- Neue Suche nach: Springer
-
Erscheinungsort:Heidelberg , London
-
Erscheinungsdatum:01.01.2011
-
Format / Umfang:14 pages
-
Anmerkungen:Includes bibliographical references and index
-
ISBN:
-
ISSN:
-
Medientyp:Aufsatz (Konferenz)
-
Format:Print
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Inhaltsverzeichnis Konferenzband
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
Beyond Nash Equilibrium: Solution Concepts for the 21st CenturyHalpern, J.Y. et al. | 2011
- 4
-
Network Security Games: Combining Game Theory, Behavioral Economics, and Network MeasurementsChristin, N. et al. | 2011
- 7
-
Indices of Power in Optimal IDS Default Configuration: Theory and ExamplesZhu, Q. / Basar, T. et al. | 2011
- 22
-
Exploiting Adversary's Risk Profiles in Imperfect Information Security GamesStocco, G.F. / Cybenko, G. et al. | 2011
- 34
-
An Anti-jamming Strategy for Channel Access in Cognitive Radio NetworksSodagari, S. / Clancy, T.C. et al. | 2011
- 44
-
Node Capture Games: A Game Theoretic Approach to Modeling and Mitigating Node Capture AttacksBonaci, T. / Bushnell, L. et al. | 2011
- 56
-
Multi-variate Quickest Detection of Significant Change ProcessSzajowski, K. et al. | 2011
- 67
-
Interplay between Security Providers, Consumers, and Attackers: A Weighted Congestion Game ApproachMaille, P. / Reichl, P. / Tuffin, B. et al. | 2011
- 87
-
Network Games with and without SynchroneityGhani, A.T.A. / Tanaka, K. et al. | 2011
- 104
-
An Asymptotic Solution of Dresher's Guessing GameFokkink, R. / Stassen, M. et al. | 2011
- 117
-
Security Games with Market InsuranceJohnson, B. / Bohme, R. / Grossklags, J. et al. | 2011
- 131
-
Aegis: A Novel Cyber-Insurance ModelPal, R. / Golubchik, L. / Psounis, K. et al. | 2011
- 151
-
Maximizing Influence in Competitive Environments: A Game-Theoretic ApproachClark, A. / Poovendran, R. et al. | 2011
- 163
-
Collaborative Location Privacy with Rational UsersSantos, F. / Humbert, M. / Shokri, R. / Hubaux, J.-P. et al. | 2011
- 182
-
Digital Trust Games: An Experimental StudyAlpcan, T. / Levi, A. / Savas, E. et al. | 2011
- 201
-
Colonel Blotto in the Phishing WarChia, P.H. / Chuang, J. et al. | 2011
- 219
-
Investment in Privacy-Preserving Technologies under UncertaintyKantarcioglu, M. / Bensoussan, A. / Hoe, S. et al. | 2011
- 239
-
Modeling Internet Security Investments: Tackling Topological Information UncertaintyPal, R. / Hui, P. et al. | 2011