共 26 条
- [1] Ahmed M.S., Al-Shaer E., Khan L., A novel approach quantitative approach for measuring network security, Proceedings of IEEE Infocomm 2008, (2008)
- [2] Ahmed M.S., Al-Shaer E., Taibah M., Abedin M., Khan L., Towards autonomic risk-aware security configuration, Proceedings of IEEE Network Operation and Management Symposium NOMS 2008, (2008)
- [3] Arce I., Levy E., An analysis of the slapper worm, Proceedings of IEEE Security & Privacy, (2003)
- [4] Becker S., State R., Engel T., Defensive configuration with game theory, Accepted to IEEE/IFIP IM 2009, (2008)
- [5] Bistarelli S., Aglio M.D., Paretti P., Strategic games on defense trees, Proceedings of FAST 2007, pp. 1-15, (2007)
- [6] Douceur J.R., Donath J.S., The Sybil Attack, pp. 251-260, (2002)
- [7] Rosenberg J., Et al., Rfc3261, Sip: Session Initiation Protocol, (2002)
- [8] Fessi A., Niedermayer H., Kinkelin H., Carle G., A cooperative SIP infrastructure for highly reliable telecommunication services, IPTComm '07: Proceedings of the 1st International Conference on Principles, Systems and Applications of IP Telecommunications, pp. 29-38, (2007)
- [9] Fiedler J., Kupka T., Ehlert S., Magedanz T., Sisalem D., Voip defender: Highly scalable sip-based security architecture, IPTComm '07: Proceedings of the 1st International Conference on Principles, Systems and Applications of IP Telecommunications, pp. 11-17, (2007)
- [10] Greenwald A., Matrix Games and Nash Equilibrium, (2007)