Analyzing Defense Strategies Against Mobile Information Leakages: A Game-Theoretic Approach
Abstract
References
Index Terms
- Analyzing Defense Strategies Against Mobile Information Leakages: A Game-Theoretic Approach
Recommendations
A game-theoretical approach for finding optimal strategies in a botnet defense model
GameSec'10: Proceedings of the First international conference on Decision and game theory for securityBotnets are networks of computers infected with malicious programs that allow cybercriminals/botnet herders to control the infected machines remotely without the user's knowledge. In many cases, botnet herders are motivated by economic incentives and ...
Optimization of rootkit revealing system resources - A game theoretic approach
Malicious rootkit is a collection of programs designed with the intent of infecting and monitoring the victim computer without the user's permission. After the victim has been compromised, the remote attacker can easily cause further damage. In order to ...
Comments
Please enable JavaScript to view thecomments powered by Disqus.Information & Contributors
Information
Published In
Publisher
Springer-Verlag
Berlin, Heidelberg
Publication History
Qualifiers
- Article
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 0Total Downloads
- Downloads (Last 12 months)0
- Downloads (Last 6 weeks)0
Other Metrics
Citations
View Options
View options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in