Author:
Çeker Hayreddin,Zhuang Jun,Upadhyaya Shambhu,La Quang Duy,Soong Boon-Hee
Publisher
Springer International Publishing
Reference31 articles.
1. Agah, A., Das, S.K.: Preventing DoS attacks in wireless sensor networks: a repeated game theory approach. IJ Netw. Secur. 5(2), 145–153 (2007)
2. Bagwell, K., Ramey, G.: Advertising and pricing to deter or accommodate entry when demand is unknown. Int. J. Indus. Organ. 8(1), 93–113 (1990)
3. Balas, E.: Know Your Enemy: Learning About Security Threats. Addison Wesley, Boston (2004)
4. Basagiannis, S., Katsaros, P., Pombortsis, A., Alexiou, N.: Probabilistic model checking for the quantification of DoS security threats. Comput. Secur. 28(6), 450–465 (2009)
5. Bell, J.B., Whaley, B.: Cheating and Deception. Transaction Publishers, Brunswick (1991)
Cited by
34 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献