Network security risk assessment studies based on the game theory

被引:0
|
作者
Xu, Yan-Li [1 ]
Wang, Ling-Ling [2 ]
Liu, Jing [1 ]
机构
[1] School of Management, Harbin Normal University, Harbin 150025, China
[2] School of Economic and Management, Northeast Forestry University, Harbin 150001, China
来源
关键词
D O I
暂无
中图分类号
学科分类号
摘要
10
引用
收藏
页码:200 / 203
相关论文
共 50 条
  • [41] Risk assessment of power system network security based on RBF neural network
    Yu Y.
    Di C.
    Guo X.
    International Journal of Power and Energy Conversion, 2023, 14 (2-3) : 148 - 158
  • [42] A Game Theory Approach in Information Security Risk Study
    Shing, Marn-Ling
    Shing, Chen-Chi
    Chen, Kuo Lane
    Lee, Huei
    E-BUSINESS, MANAGEMENT AND ECONOMICS, 2011, 3 : 201 - +
  • [43] Fuzzy risk assessment of the network security
    Zhao, Dong-Mei
    Wang, Jing-Hong
    Ma, Jian-Feng
    PROCEEDINGS OF 2006 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2006, : 4400 - +
  • [44] When game theory meets security and privacy related risk assessment of vehicular networks (VANET)
    Bahamou, Sara
    El Louadghiri, Driss
    Bonnin, Jean-Marie
    Journal of Mobile Multimedia, 2017, 12 (3-4): : 213 - 224
  • [45] Security coalition method based on game theory
    Huang, Kai-Zhi
    Hong, Ying
    Luo, Wen-Yu
    Lin, Sheng-Bin
    Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2015, 37 (07): : 1562 - 1568
  • [46] Game theory based optimization of security configuration
    Shi, Jin
    Lu, Yin
    Xie, Li
    CIS: 2007 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PROCEEDINGS, 2007, : 799 - 803
  • [47] Risk assessment of mud and water surges in tunnels based on game theory and regret theory
    Ren, Yingwei
    Wang, Boxun
    2022 8TH INTERNATIONAL CONFERENCE ON HYDRAULIC AND CIVIL ENGINEERING: DEEP SPACE INTELLIGENT DEVELOPMENT AND UTILIZATION FORUM, ICHCE, 2022, : 1017 - 1022
  • [48] Study on the Risk Detection about Network Security Based on Grey Theory
    Kuang Yin
    Tang Nianqing
    2009 INTERNATIONAL FORUM ON INFORMATION TECHNOLOGY AND APPLICATIONS, VOL 1, PROCEEDINGS, 2009, : 411 - +
  • [49] Information Security Risk Assessment Based on Artificial Immune Danger Theory
    Zhuang, Yi
    Li, Xiaorong
    Xu, Bin
    Zhou, Bo
    2009 FOURTH INTERNATIONAL MULTI-CONFERENCE ON COMPUTING IN THE GLOBAL INFORMATION TECHNOLOGY (ICCGI 2009), 2009, : 169 - 174
  • [50] The model of information security risk assessment based on advanced evidence theory
    Qing H.
    Qingsheng X.
    Shaobo L.
    International Journal of System Assurance Engineering and Management, 2017, 8 (Suppl 3) : 2030 - 2035