Abstract | ||
---|---|---|
As networks become ubiquitous in people's lives, users depend on networks a lot for sufficient communication and convenient information access. However, networks suffer from security issues. Network security becomes a challenging topic since numerous new network attacks have appeared increasingly sophisticated and caused vast loss to network resources. Game theoretic approaches have been introduce... |
Year | DOI | Venue |
---|---|---|
2013 | 10.1109/SURV.2012.062612.00056 | IEEE Communications Surveys & Tutorials |
Keywords | Field | DocType |
Game theory,Monitoring,Bayesian methods,Access control,Computer crime | Network security policy,Resource (disambiguation),Computer security,Computer science,Network security,Information access,Algorithmic game theory,Game theory,Network Access Control,Computer security model | Journal |
Volume | Issue | ISSN |
15 | 1 | 1553-877X |
Citations | PageRank | References |
25 | 1.04 | 0 |
Authors | ||
2 |
Name | Order | Citations | PageRank |
---|---|---|---|
Xiannuan Liang | 1 | 90 | 7.37 |
Yang Xiao | 2 | 6317 | 456.36 |