共 20 条
- [1] Bowers K.D., Van Dijk M., Griffin R., Juels A., Oprea A., Rivest R.L., Triandopoulos N., Defending against the unknown enemy: Applying flipIt to system security, GameSec 2012. LNCS, 7638, pp. 248-263, (2012)
- [2] (2011)
- [3] Van Dijk M., Juels A., Oprea A., Rivest R.L., FlipIt: The game of “stealthy takeover”. Cryptology ePrint Archive, (2012)
- [4] Falliere N., Murchu L.O., Chien E., W32.Stuxnet Dossier, (2011)
- [5] Finkle J., Shalal-Esa A., Hackers breached U.S. defense contractors
- [6] Grossklags J., Reitter D., How task familiarity and cognitive predispositions impact behavior in a security game of timing, Proceedings of the 27th IEEE Computer Security Foundations Symposium, (2014)
- [7] (2012)
- [8] (2013)
- [9] Laszka A., Felegyhazi M., Buttyan L., A survey of interdependent security games. Tech. Rep, (2012)
- [10] Laszka A., Horvath G., Felegyhazi M., Buttyan L., FlipThem: Modeling targeted attacks with FlipIt for multiple resources