Quantitative Models of Imperfect Deception in Network Security using Signaling Games with Evidence.
Jeffrey PawlickQuanyan ZhuPublished in: CoRR (2017)
Keyphrases
- network security
- traffic analysis
- intrusion detection
- intrusion detection system
- computer networks
- computer security
- anomaly detection
- network traffic
- probabilistic model
- risk assessment
- security policies
- databases
- incomplete information
- wireless networks
- decision support
- distributed systems
- dos attacks
- imperfect information
- network intrusion
- wired networks