Tytuł artykułu
Autorzy
Wybrane pełne teksty z tego czasopisma
Identyfikatory
Warianty tytułu
Języki publikacji
Abstrakty
The paper presents briefly a game theoretical approach to analysis IT security. This approach uses a model of n-person stochastic game. The authors present chosen elements of formal model and point at the most important problems. The practical aspects of such approach were discussed.
Słowa kluczowe
Czasopismo
Rocznik
Tom
Strony
229--233
Opis fizyczny
Bibliogr. 16 poz.
Twórcy
autor
- Instytut Informatyki Stosowanej, Politechnika Wrocławska, ul. Wybrzeże Wyspiańskiego 27, 50-370 Wrocław, Poland
autor
Bibliografia
- 1. Agah A., Das S.K., Basu K.: A game theory based approach for security in wireless sensor networks. Proceedings of IEEE International Performance Computing and Communications Conference, p. 259- 263, 2004.
- 2. Alpcan T., Basar T.: A game theoretic approach to decision and analysis in network intrusion detection. IEEE Conference on Decision and Control, p. 2595-2600, 2003.
- 3. Alpcan T., Basar T.: A game theoretic analysis of intrusion detection in access control systems, Proceedings. IEEE Conference on Decision and Control, p. 1568-1573, 2004.
- 4. Browne R.: Defensive information warfare with non-localizable command and control. New Jersey Computer and Communications (http://citeseer.ist.psu.edu/485272.html), 2000.
- 5. Brynielson J.: Game-theoretic reasoning in command and control, 15th Mini-EURO Conference: Managing Uncertainty in Decision Support Models, 2004.
- 6. Burke D.: Towards a game theory model of information warfare, Master Thesis, Airforce Institute of Technology, Air University, 1999.
- 7. Hamilton S.N., Miller W.L., Ott A.: The role of game theory in information warfare, Proceedings of 4th Information Survivability Workshop, 2002.
- 8. Hamilton S.N., Miller W.L., Ott A.: Challenges in applying game theory to the domain of information warfare. Proceedings of 4th Information Survivability Workshop, 2002.
- 9. Hespanha, J., Bohacek S.: Preliminary Results in Routing Games. Proceedings of the 2001 American Control Conference, vol. 3, p. 1904-1909, 2001.
- 10. Jóźwiak I., Laskowski W., Zych J.: An application of game theory to security and reliability. Advances in safety and reliability. Proceedings of the European Safety and Reliability Conference (ESREL 2005). Gdynia-Sopot-Gdańsk, 27-30 June 2005. Vol. 1. 2005 p. 989-994, 2005.
- 11. Kałuski J.: Game theory. Gliwice 2002 (in Polish).
- 12. Kodialam, M., Lakshman, T.V.: Detecting Network Intrusion via Sampling: A Game Theoretic Approach. Proceedings of The 22nd Annual Joint Conference of the IEEE Computer and Communications Societies, San Francisco. USA, 2003.
- 13. Laskowski W.: Ochrona informacji w systemach teleinformatycznych – współczesne trendy i zagrożenia. Przegląd Telekomunikacyjny i Wiadomości Telekomunikacyjne, 1, p. 12 – 17, 2005.
- 14. K. wei Lye and Wing J.: Game strategies in network security. International Journal of Information Security, 4(1-2), p. 71-86, 2005.
- 15. Michardi, P., Molva, R.: Game theoretic analysis of security in mobile ad hoc networks. Research report No. RR-02-070, Institut Telcom, France, 2002.
- 16. G.Owen: Game theory, PWN, Warszawa 1975 (in Polish).
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-d4c93c70-d44d-4a4b-bf1a-6396eb94c493