Game of information security investment: Impact of attack types and network vulnerability.
Yong WuGengzhong FengNengmin WangHuigang LiangPublished in: Expert Syst. Appl. (2015)
Keyphrases
- information security
- security risks
- countermeasures
- attack graphs
- network security
- denial of service
- dos attacks
- risk assessment
- security issues
- smart card
- buffer overflow
- attack graph
- intrusion detection
- cyber attacks
- information systems
- security threats
- computer security
- security level
- network structure
- smart grid
- network traffic
- computer networks
- information assurance
- iso iec
- critical infrastructure
- security requirements
- technical issues
- sensitive data
- denial of service attacks
- e government
- information security management
- decision making
- ddos attacks
- risk analysis
- power system
- cooperative game
- information technology
- communication networks
- database