1 |
김우한, 심원태, 노명선, 최중섭, 허창열, "정보시스템 해킹, 바이러스 현황 및 대응," 한국정보보호진흥원, 2006년 12월
|
2 |
A. Clementi, "Anti-Virus comparative, No.11," AV comparatives, Aug. 2006
|
3 |
T. Alpcan and T. Basar, "A game theoretic approach to decision and analysis in network intrusion detection," Decision and Control, vol. 42, no. 3, pp. 2595-2600, Dec. 2003
|
4 |
K. Lye and J. Wing, "Game strategies in network security," International Journal of Information Security, vol. 4, no. 1-2, pp. 71-86. Feb. 2005
DOI
ScienceOn
|
5 |
D. Fudenberg and J. Tirole, Game Theory, MIT Press, pp. 1-63, Feb. 1991
|
6 |
X. You and Z. Shiyong, "A Kind of network security behavior model Based on game theory," Parallel and Distributed Computing, Applications and Technologies, pp. 950-954, Aug. 2003
|
7 |
M. Kodialam and V. Lakshman, "Detecting Network Intrusions via Sampling: A Game Theoretic Approach," IEEE INFOCOM 2003, vol. 3, pp. 1880-1889, Mar. 2003
|
8 |
R. Myerson, Game Theory: Analysis of Conflict, Harvard Press, Nov. 1991
|
9 |
J. Oberheide, E. Cooke and F. Jahanian, "Rethinking Antivirus: Executable Analysis in the Network Cloud," Proceedings of the 2nd USENIX Work shop on Hot Topics in Security, pp. 1-11, Aug. 2007
|
10 |
R. Aumann and S. Hart, Handbook of Game Theory with Economic Application, ELSEVIER, vol. 3, pp. 1723-1797, Jan. 2002
|
11 |
M. Mavronicolas, V. Papadopoulou, A. Philippou and P. Spirakis, "A Graph -Theoretic Network Security Game," International Journal of Autonomous and Adaptive Communications Systems, vol. 1, no. 4, pp. 390-410, May 2008
DOI
ScienceOn
|