Author:
Collins Brandon,Xu Shouhuai,Brown Philip N.
Publisher
Springer International Publishing
Reference24 articles.
1. Brown, S., Gommers, J., Serrano, O.S.: From cyber security information sharing to threat management. In: Proceedings of the 2nd ACM WISCS 2015, Denver, Colorado, USA, 12 October 2015, pp. 43–49 (2015)
2. Do, C.T., et al.: Game theory for cyber security and privacy. ACM Comput. Surv. 50(2), 30:1–30:37 (2017)
3. Ezhei, M., Ladani, B.T.: Information sharing vs. privacy: a game theoretic analysis. Expert Syst. Appl. 88, 327–337 (2017)
4. Finin, T., et al.: Assured information sharing life cycle. In: IEEE ISI 2009, Dallas, Texas, USA, 8–11 June 2009, Proceedings, pp. 307–309 (2009)
5. Fischer, E., Liu, E., Rollins, J., Theohary, C.: The 2013 cybersecurity executive order: Overview and considerations for congress, 15 December 2014
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献