Affiliation:
1. University of California, Berkeley
2. Vanderbilt University
Funder
National Science Foundation
Air Force Research Laboratory
Reference22 articles.
1. Scheduling Intrusion Detection Systems in Resource-Bounded Cyber-Physical Systems
2. M. Abrams and J. Weiss. Malicious control system cyber security attack case study -- Maroochy Water Services Australia. http://csrc.nist.gov/groups/SMA/fisma/ics/documents/Maroochy-Water-Services-Case-Study_report.pdf Jul 2008. M. Abrams and J. Weiss. Malicious control system cyber security attack case study -- Maroochy Water Services Australia. http://csrc.nist.gov/groups/SMA/fisma/ics/documents/Maroochy-Water-Services-Case-Study_report.pdf Jul 2008.
3. A game theoretic approach to decision and analysis in network intrusion detection
4. A game theoretic analysis of intrusion detection in access control systems
5. A Tight Linear Time (1/2)-Approximation for Unconstrained Submodular Maximization
Cited by
27 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献