Security analysis model of intrusion tolerant systems based on game theory

被引:0
|
作者
Zhou, Hua [1 ]
Zhou, Hai-Jun [1 ]
Ma, Jian-Feng [1 ]
机构
[1] Xi'an Communications Institute, Xi'an 710106, China
关键词
Game theory;
D O I
10.3724/SP.J.1146.2012.01081
中图分类号
学科分类号
摘要
引用
收藏
页码:1933 / 1939
相关论文
共 50 条
  • [1] Security attributes analysis for intrusion tolerant systems
    Yin, Li-Hua
    Fang, Bin-Xing
    Jisuanji Xuebao/Chinese Journal of Computers, 2006, 29 (08): : 1505 - 1512
  • [2] A game theoretic approach based on intrusion tolerant systems
    Sanoussi, Nouhad
    Orhanou, Ghizlane
    El Hajji, Said
    International Journal of Security and Networks, 2020, 15 (03): : 175 - 181
  • [3] A Game Theory Based Risk and Impact Analysis Method for Intrusion Defense Systems
    Luo, Yi
    Szidarovszky, Ferenc
    Al-Nashif, Youssif
    Hariri, Salim
    2009 IEEE/ACS INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS, VOLS 1 AND 2, 2009, : 975 - +
  • [4] Security Evaluation of Layered Intrusion Tolerant Systems
    Razavi, Sanaz Hafezian
    Das, Olivia
    ANALYTICAL AND STOCHASTIC MODELING TECHNIQUES AND APPLICATIONS, PROCEEDINGS, 2010, 6148 : 145 - 158
  • [5] A generic intrusion detection game model in IT security
    Kantzavelou, Ioanna
    Katsikas, Sokratis
    TRUST, PRIVACY AND SECURITY IN DIGITAL BUSINESS, PROCEEDINGS, 2008, 5185 : 151 - +
  • [6] Mean Time to Security Failure of VM-Based Intrusion Tolerant Systems
    Zheng, Junjun
    Okamura, Hiroyuki
    Dohi, Tadashi
    2016 IEEE 36TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS WORKSHOPS (ICDCSW 2016), 2016, : 128 - 133
  • [7] Mean Time to Security Failure of VM-Based Intrusion Tolerant Systems
    1600, Institute of Electrical and Electronics Engineers Inc., United States
  • [8] Survivability Analysis of VM-Based Intrusion Tolerant Systems
    Zheng, Junjun
    Okamura, Hiroyuki
    Dohi, Tadashi
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2015, E98D (12): : 2082 - 2090
  • [9] A Game Theory Approach for Intrusion Prevention Systems
    Mojica Sanchez, Julian Francisco
    Salcedo Parra, Octavio Jose
    Correa Sanchez, Lewys
    APPLIED COMPUTER SCIENCES IN ENGINEERING, WEA 2018, PT I, 2018, 915 : 218 - 229
  • [10] A method for modeling and quantifying the security attributes of intrusion tolerant systems
    Madan, BB
    Goseva-Popstojanova, K
    Vaidyanathan, K
    Trivedi, KS
    PERFORMANCE EVALUATION, 2004, 56 (1-4) : 167 - 186