Network security risk assessment studies based on the game theory

被引:0
|
作者
Xu, Yan-Li [1 ]
Wang, Ling-Ling [2 ]
Liu, Jing [1 ]
机构
[1] School of Management, Harbin Normal University, Harbin 150025, China
[2] School of Economic and Management, Northeast Forestry University, Harbin 150001, China
来源
关键词
D O I
暂无
中图分类号
学科分类号
摘要
10
引用
收藏
页码:200 / 203
相关论文
共 50 条
  • [31] Game theory in network security for digital twins in industry
    Feng, Hailin
    Chen, Dongliang
    Lv, Haibin
    Lv, Zhihan
    DIGITAL COMMUNICATIONS AND NETWORKS, 2024, 10 (04) : 1068 - 1078
  • [32] Game theory in network security for digital twins in industry
    Hailin Feng
    Dongliang Chen
    Haibin Lv
    Zhihan Lv
    Digital Communications and Networks, 2024, 10 (04) : 1068 - 1078
  • [33] Security Risk Assessment Based on CRITIC and Improved Neural Network
    Cai, Lijuan
    PROCEEDINGS OF 2024 3RD INTERNATIONAL CONFERENCE ON CRYPTOGRAPHY, NETWORK SECURITY AND COMMUNICATION TECHNOLOGY, CNSCT 2024, 2024, : 142 - 147
  • [34] A proposal for an agent based security risk assessment in a Community Network
    Saylani, Najib
    Managing Information in the Digital Economy: Issues & Solutions, 2006, : 733 - 737
  • [35] A Logic-based Approach to Network Security Risk Assessment
    Ji, Yi
    Wen, Danyan
    Wang, Haiquan
    Xia, Chunhe
    2009 ISECS INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT, VOL III, 2009, : 9 - +
  • [36] Network Security Risk Assessment Based on Enterprise Environment Characteristics
    Yang, Yunxue
    Yang, Zhenqi
    Yang, Qin
    Ji, Guohua
    Xue, Shengjun
    International Journal of Network Security, 2022, 24 (01) : 156 - 165
  • [37] Research on Network Security Risk Assessment Based on Group Consistency
    Liu Xiang-qin
    Chen Xia
    2009 WRI WORLD CONGRESS ON SOFTWARE ENGINEERING, VOL 3, PROCEEDINGS, 2009, : 425 - 428
  • [38] A Network Security Risk Assessment Method based on Immunity Algorithm
    Yuan Hao
    PROGRESS IN MEASUREMENT AND TESTING, PTS 1 AND 2, 2010, 108-111 : 948 - 953
  • [39] A Vulnerability Assessment Method for Network System Based on Cooperative Game Theory
    Duan, Chenjian
    Wang, Zhen
    Ding, Hong
    Jiang, Mengting
    Ren, Yizhi
    Wu, Ting
    ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2019, PT II, 2020, 11945 : 391 - 398
  • [40] A Cooperative Game for Online Cloud Federation Formation based on Security Risk Assessment
    Halabi, Talal
    Bellaiche, Martine
    Abusitta, Adel
    2018 5TH IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND CLOUD COMPUTING (IEEE CSCLOUD 2018) / 2018 4TH IEEE INTERNATIONAL CONFERENCE ON EDGE COMPUTING AND SCALABLE CLOUD (IEEE EDGECOM 2018), 2018, : 83 - 88