[1]
|
K. Lye and J. Wing, “Game Strategies in Network Secu-rity,” International Journal of Information Security, Vol. 4, 2005, pp. 71-86.
|
[2]
|
D. Shen, G. Chen, E. Blasch and G. Tadda, “Adaptive Markov Game Theoretic Data Fusion Approach for Cyber Network Defense,” IEEE Military Communications Conference (MILCOM 2007), Orlando, 2007.
|
[3]
|
L. Carin, G. Cybenko and J. Hughes, “Cybersecurity Strategies: The QuERIES Methoddology,” Computer, Vol. 41, No. 8, 2008, pp. 20-26.
|
[4]
|
Z. Zhang and P. Ho, “Janus: A Dual-Purpose Analytical Model for Understanding, Characterizing and Counter-mining Multi-Stage Collusive Attacks in Enterprise Net-works” Journal of Network and Computer Applications, Vol. 32, No. 3, 2009, pp. 710-720.
|
[5]
|
P. Liu and W. Zang, “Incentive-Based Modeling and Inference of Attack Intent, Objectives, and Strategies,” CCS’03, Washington, DC, 2003.
|
[6]
|
W. M. Siever, A. Miller and D. R. Tauritz, “Blueprint for Iteratively Hardening Power Grids Employing Unified Power Flow Controllers,” SoSE’07, IEEE International Conference on System of Systems Engineering, Tampa, 2007.
|
[7]
|
Y. Luo, F. Szidarovszky, Y. Al-Nashif and S. Hariri, “Game Tree Based Partially Observable Stochastic Game Model for Intrusion Defense Systems (IDS),” IIE Annual Conference and Expo (IERC 2009), Miami, 2009.
|
[8]
|
F. Forgo, J. Szep and F. Szidarovszky, “Introduction to the Theory of Games,” Kluwer Academic Publishers, Dordrecht, 1999.
|
[9]
|
B. T. Richardson and L. Chavez, “National SCADA Test Bed Consequence Modeling Tool,” Sandia National La- boratory Report, SAND2008-6098, Albuquerque, 2008.
|
[10]
|
F. Szidarovszky, M. Gershon and L. Duckstein, “Tech-niques for Multiobjective Decision Making in Systems Management,” Elsevier, Amsterdam, 1986.
|