Study on Resource Optimal Allocation of Internal Threat Nuclear Security Events Based on Stackelberg Game
Abstract
References
Index Terms
- Study on Resource Optimal Allocation of Internal Threat Nuclear Security Events Based on Stackelberg Game
Recommendations
Towards Countermeasure of Insider Threat in Network Security
INCOS '11: Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative SystemsWe discuss countermeasure against insider threats in network security aspect. In the context of countermeasure against insider threats, there is no perimeter for access control in a network. A traditional access control process by using a firewall on a ...
Search Engines as a Security Threat
Search engines index a huge number of Web pages and other resources. Hackers can use these engines to make anonymous attacks, find easy victims, and gain the knowledge necessary to mount a powerful attack against a network.Further, search engines can ...
Optimal Security Investments in a Prevention and Detection Game
HoTSoS: Proceedings of the Hot Topics in Science of Security: Symposium and BootcampMost security defenses can be breached by motivated adversaries, therefore in addition to attack-prevention technologies, firms investing in cyber-security for their information technology infrastructure need to consider attack-detection and restoration ...
Comments
Information & Contributors
Information
Published In
![cover image ACM Other conferences](/cms/asset/4bcacc03-786f-40f3-8d19-5cbe9e68b072/3677182.cover.jpg)
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Qualifiers
- Research-article
- Research
- Refereed limited
Conference
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 9Total Downloads
- Downloads (Last 12 months)9
- Downloads (Last 6 weeks)2
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign inFull Access
View options
View or Download as a PDF file.
PDFeReader
View online with eReader.
eReaderHTML Format
View this article in HTML Format.
HTML Format