The game security and security game: hacking, law and public policy

被引:1
|
作者
McMullan, John L. [1 ]
Perrier, David C. [1 ]
机构
[1] St Marys Univ, Sociol & Criminol, Halifax, NS, Canada
关键词
D O I
10.7202/013127ar
中图分类号
DF [法律]; D9 [法律];
学科分类号
0301 ;
摘要
引用
收藏
页码:83 / 106
页数:24
相关论文
共 50 条
  • [31] The Game Analysis of China Energy Security
    Wang Jinzhou
    Wang Xueting
    2013 INTERNATIONAL CONFERENCE ON MACHINERY, MATERIALS SCIENCE AND ENERGY ENGINEERING, 2013, 318 : 432 - 436
  • [32] Game Theoretic Analysis of Security and Sustainability
    An, Bo
    PROCEEDINGS OF THE TWENTY-SIXTH INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE, 2017, : 5111 - 5115
  • [33] Efficient network security as a strategic game
    Schlake, Fari
    Mili, Lamine
    INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURES, 2013, 9 (03) : 243 - 273
  • [34] Beat security auditors at their own game
    Nachreiner, C., 1600, Elsevier Ltd (2013):
  • [35] CounterMeasures: A Game for Teaching Computer Security
    Jordan, Craig
    Knapp, Matt
    Mitchell, Dan
    Claypool, Mark
    Fisler, Kathi
    2011 10TH ANNUAL WORKSHOP ON NETWORK AND SYSTEMS SUPPORT FOR GAMES (NETGAMES 2011), 2011,
  • [36] Multiobjective security game with fuzzy payoffs
    Bigdeli, H.
    Hassanpour, H.
    Tayyebi, J.
    IRANIAN JOURNAL OF FUZZY SYSTEMS, 2019, 16 (01): : 89 - 101
  • [37] GAME THEORY AND PUBLIC POLICY
    Congleton, Roger D.
    PUBLIC ADMINISTRATION, 2013, 91 (01) : 248 - 250
  • [38] A public policy shell game?
    Rutman, ID
    PSYCHIATRIC REHABILITATION JOURNAL, 1999, 23 (01) : 1 - 2
  • [39] Security Defense Policy Selection Method Using the Incomplete Information Game Model
    Zhang Hengwei
    Yu Dingkun
    Wang Jindong
    Han Jihong
    Wang Na
    CHINA COMMUNICATIONS, 2015, 12 (02) : 123 - 131
  • [40] Security Defence Policy Selection Method Using the Incomplete Information Game Model
    ZHANG Hengwei
    YU Dingkun
    WANG Jindong
    HAN Jihong
    WANG Na
    China Communications, 2015, (S2) : 123 - 131