|
References [1]R.J. Ellison, D.A. Fisher, R.C. Linger, H.F. Lipson, T. Longstaff, and N.R. Mead, “Survivable Network Systems: An Emerging Discipline,” Technical Report CMU/SEI-97-TR-013, November 1997. [2]A.T Murray. T.C. Matisziw, T. H. Grubesic, “Critical network infrastructure analysis: interdiction and system flow,” Journal of Geographical Systems. Vol. 9, No. 2, pp. 103-117, June, 2007. [3]J.C. Smith, C. Lim, F. Sudargho, “Survivable network design under optimal and heuristic interdiction scenarios,” Journal of Global Optimization. Vol. 38, No. 2, pp. 181-199, June, 2007. [4]E.Jonsson and T. Olovsson, “A Quantitative Model of the Security Intrusion Process Based on Attacker Behavior,” IEEE Transactions of Software Engineering, Vol. 23, No. 4, pp. 235-245, April 1997. [5]R. Ortalo, Y. Deswarte, and M. Kaaniche, “Experimenting with Quantitative Evaluation Tools for Monitoring Operational Security,” IEEE Transactions on Software Engineering, Vol. 25, Vol. 5, pp. 633-650, September 1999. [6]J. McDermott, “Attack-Potential-Based Survivability Modeling for High-Consequence Systems,” Proceedings of the 3rd IEEE International Workshop on Information Assurance, pp. 119-130, March 2005. [7]D.A. Burke, “Towards a Game Theory Model of Information Warfare,” Master''s thesis, Graduate School of Engineering and Management, Airforce Institute of Technology, Air University, November 1999. [8]J.C. Harsanyi, “Games with Incomplete Information Played by “Bayesian” Players,” I–III: Part I. The Basic Model&. Management Science, Vol. 50, pp. 1804-1817, 2004. [9]K. Hausken, and G. Levitin, “Protection vs. False Targets in Series Systems,” Reliability Engineering & System Safety, Vol. 94, NO.5, pp. 973-981, 2009. [10]G. Levitin, and K. Hausken, “False Targets Efficiency in Defense Strategy,” European Journal of Operational Research,Vol. 194, No. 1, pp 155-162, 2009. [11]R. Peng, , G. Levitin, M. Xie, S.H. Ng, “Intelligence and Impact Contests in Defending a Single Object with Imperfect False Targets. in Industrial Engineering and Engineering Management,” IEEM. IEEE International Conference, 2009. [12]P. Rui, , W. Wenbin, and Z. Fei, “Object Defense Strategy with Imperfect False Targets and disinformation. in Quality, Reliability,” Risk, Maintenance, and Safety Engineering (ICQR2MSE), 2012. [13]T. Bas¸ar and G. J. Olsder, “Dynamic Noncooperative Game Theory,” 2nd edition, Classics in Applied Mathematics, SIAM, Philadelphia, 1999. [14]M. Benaım, “Dynamics of Stochastic Approximations. Le Seminaire de Probabilites,” Lectures Notes in Mathematics, Vol. 1709, pp. 1-68, 1999. [15]T. Borgers and R. Sarin, “Learning Through Reinforcement and Replicator Dynamics,” Appeared in Journal of Economic Theory, Vol. 77, No. 1, pp. 1-14, November 1997. [16]H. P. Young, Strategic Learning and Its Limits, Oxford University Press, 2004. [17]V.M. Bier, S. Oliveros and L. Samuelson, “Choosing What to Protect: Strategic Defensive Allocation against an Unknown Attacker,” Journal of Public Economic Theory, Vol. 9, No. 4, pp. 563-587, August 2007. [18]J. Zhuang and V.M. Bier, “Balancing Terrorism and Natural Disasters - Defensive Strategy with Endogenous Attacker Effort,” Operations Research, Vol. 55, No. 5, pp. 976-991, September 2007. [19]T. Sandler and D.G. Arce, “Terrorism and Game Theory,” Simulation & Gaming, Vol. 34, No. 3, pp.319-337, September 2003. [20]K. Hausken and V.M. Bier, “Defending against Multiple Different Attackers,” European Journal of Operational Research, Vol. 211, No. 2, pp. 370-384, June 2011. [21]J. Zhuang, V.M. Bier and O. Alagoz, “Modeling Secrecy and Deception in a Multiple-period Attacker–defender Signaling Game,” European Journal of Operational Research, Vol. 203, No. 2, pp. 409-418, June 2010. [22]J. Zhuang and V.M. Bier, “Secrecy and Deception at Equilibrium, with Applications to Anti-terrorism Resource Allocation,” Defence and Peace Economics, Vol. 22, No. 1, pp. 43-61, February 2011. [23]N.S. Dighe, J. Zhuang and V.M. Bier, “Secrecy in Defensive Allocations as a Strategy for Achieving More Cost-effective,” International Journal of Performability Engineering, Vol. 5, No. 1, pp. 31-43, January 2009. [24]R. Powell, “Allocating Defensive Resources with Private Information about Vulnerability,” American Political Science Review, Vol. 101, No. 4, pp. 799-809, November 2007. [25]N.C. Rowe, “Deception in Defense of Computer Systems from Cyber Attack,” Cyber Warfare and Cyber Terrorism, pp. 97-104, 2008. [26]N.C. Rowe and H.S. Rothstein, “Two Taxonomies of Deception for Attacks on Information Systems,” Journal of Information Warfare, Vol. 3, No. 2, pp. 27-39, July 2004. [27]M Borrett, “Cyber Strategies Revealed,” IBM Institute for Advanced Security, 11 December, 2011. [28]K. Hausken, “Strategic Defense and Attack for Reliability Systems,” Reliability Engineering & System Safety, Vol. 93, No. 11, pp. 1740-1750, November 2008. [29]M.N. Azaiez and V.M. Bier, “Optimal Resource Allocation for Security in Reliability Systems,” European Journal of Operational Research, Vol. 181, No. 2, pp. 773-786, September 2007. [30]F.Y.S. Lin, P.H. Tsang, P.Y. Chen and H.T. Chen, “Maximization of Network Robustness Considering the Effect of Escalation and Accumulated Experience of Intelligent Attackers,” Proc. World Multiconference on Systemics, Cybernetics and Informatics, 2009. [31]G. Levitin and K. Hausken, “Resource Distribution in Multiple Attacks against a Single Target,” Risk Analysis, Vol. 30, No. 8, pp. 1231-1239, August 2010. [32]C. Pinzón, J. F. D Paz, C. Zato, and J. Pérez, “Protecting Web Services against DoS Attacks: A Case-Based Reasoning Approach,” Lecture Notes in Computer Science, Vol. 6076, pp. 229-236, 2010. [33]A.T. Murray, T.C. Matisziw, and T. H. Grubesic, “Critical Network Infrastructure Analysis: Interdiction and System Flow,” Journal of Geographical Systems, Vol. 9, No. 2, pp. 103-117, June, 2007. [34]J.C. Smith, C. Lim, and F. Sudargho, “Survivable Network Design under Optimal and Heuristic Interdiction Scenarios,” Journal of Global Optimization, Vol. 38, No. 2, pp. 181-199, June 2007. [35]M.S. Deutsch and R.R. Willis, “Software Quality Engineering: A Total Technical and Management,” Approach, Englewood Cliffs, NJ: Prentice-Hall, 1988. [36]“Terms and Definitions Related to Quality of Service, Availability, and Reliability,” CCITT Fascicle III. 1 Rec. G. 106, 1984. [37]V.R. Westmark, “A Definition for Information System Survivability,” Proceedings of the 37th IEEE Hawaii International Conference on System Sciences, January 2004. [38]M.S. Deutsch and R.R. Willis, “Software Quality Engineering: A Total Technical and Management Approach,” Englewood Cliffs, NJ: Prentice-Hall, 1988. [39]L. Wu and P.K. Varshney, “On Survivability Measures for Military Networks,” IEEE Military Communications Conference, Vol. 3, pp. 1120-1124, October 1990. [40]T.-Z. Jiang, “A New Definition on Survivability of Communication a Networks,” Conference Record of IEEE Military Communications Conference 1991 (MILCOM''91), Vol. 3, pp. 901-904, November 1991. [41]S.C. Liew and K.W. Lu, “A Framework for Network Survivability Characterization,” IEEE International Conference on Communications 1992, Vol. 1, pp. 405-410, June 1992. [42]J. Shi and J.P. Fonseka, “Traffic-based Survivability Analysis of Telecommunications Networks,” IEEE Global Telecommunications Conference, Vol. 2, pp. 936-940, November 1995. [43]K.J. Sullivan, S. Geist, and P. Shaw, “Mediators in Infrastructure Survivability Enhancement,” ACM Proc. of the 3rdIinternational Workshop on Software Architecture, pp. 141-144, November 1998. [44]A.P. Snow, U. Varshney, and A.D. Malloy, “Reliability and Survivability of Wireless and Mobile Networks,” Computer, Vol. 33, No. 7, pp. 49-55, July 2000. [45]D. Awduche, A. Chiu, A. Elwalid, I. Widjaja, and X. Xiao, “Overview and Principles of Internet Traffic Engineering,” RFC3272, May 2002. [46]ATIS Telecom Glossary 2007, Alliance for Telecommunications Industry Solutions, http://www.atis.org/glossary/definition.aspx?id=1039. [47]S. Balasubramaniam, D. Botvich, W. Donnelly, and N. Agoulmine, “A Multi-layered Approach Towards Achieving Survivability in Autonomic Network,” IEEE International Conference on Telecommunications and Malaysia International Conference on Communications, pp. 360-365, May 2007. [48]M. Garg and J. C. Smith, “Models and Algorithms for the Design of Survivable Multicommodity Flow Networks with General Failure Scenarios,” Omega, Vol. 36, No. 6, pp. 1057-1071, December 2008. [49]Z. Ma and A.W. Krings, “Survival Analysis Approach to Reliability, Survivability and Prognostics and Health Management (PHM),” IEEE Aerospace Conference 2008, pp. 1-20, March 2008. [50]B. Bassiri and S.S. Heydari,“Network Survivability in Large-Scale Regional Failure Scenarios,” Proceedings of the Second Canadian Conference on Computer Science and Software Engineering, Montreal, Quebec, Canada, pp. 83-87, 2009. [51]P.E. Heegaard and K.S. Trivedi, “Network Survivability Modeling,” Computer Networks, Vol. 53, No. 8, pp. 1215-1234, 2009. [52]F. Xing and W. Wang, “On the Survivability of Wireless Ad Hoc Networks with Node Misbehaviors and Failures,” IEEE Transactions on Dependable and Secure Computing, Vol. 7, No. 3, pp. 284-299, 2010. [53]L. Xie, P.E. Heegaard, and Y. Jiang, “Network Survivability under Disaster Propagation: Modeling and Analysis,” IEEE Wireless Communications and Networking Conference, 2013. [54]L. Ming, G. Zhao, D.X. Wang, M.H. Huang,X. Li, Q. Miao, F. Xu, “A Novel Method for Survivability Test Based on End Nodes in Large Scale Network,” KSII Transactions on Internet and Information Systems, Vol. 9 ,No. 2, pp. 620-636, 2015. [55]S. Skaperdas, Contest Success Functions, Economic Theory, 1996. [56]G. Levitin and K. Hausken, “Parallel Systems under two Sequential Attacks”, Reliability Engineering and System Safety, Vol. 94, No. 3, pp. 763-772, March 2009. [57]G. Levitin and K. Hausken, “Resource Distribution in Multiple Attacks against a Single Target,” Risk Analysis, Vol. 30, 2010. [58]J. E. Ramirez-Marquez, C.M. Rocco, G. Levitin, “Optimal Network Protection against Diverse Interdictor Strategies,” Reliability Engineering and System Safety, Vol. 96, pp.374-382, 2011. [59]L. Wang, S. Ren, K. Yue, K. Kwiat, “Optimal Resource Allocation for Protecting System Availability against Random Cyber Attacks,” Proc. 3rd Int. Conf. ICCRD, Vol. 1, pp.477-482, 2011. [60]F.Y.S. Lin, H.H. Yen, P.Y. Chen and Y.F. Wen, “Evaluation of Network Survivability Considering Degree of Disconnectivity,” Proc. HAIS’11, 2011. [61]O.M. Al-Kofahi and A.E. Kamal, “Survivability Strategies in Multihop Wireless Networks,” IEEE Wireless Communications, Vol. 17, No. 5, pp. 71-80, October 2010. [62]S. Neumayer and E. Modiano, “Network Reliability with Geographically Correlated Failures,” Proc. IEEE INFOCOM, 2010. [63]T. Alpcan and T. Baser, “A Game Theoretic Analysis of Intrusion Detection in Access Control Systems,” Proc. 43rd IEEE Conference on Decision and Control, 2004. [64]X. Liang and Y. Xiao, “Game Theory for Network Security,” IEEE Communications Surveys & Tutorials, 2013. [65]T. Alpcan and T. Baser, “An Intrusion Detection Game with Limited Observations,” Proc. 12th Int. Symp. on Dynamic Games and Applications, 2012. [66]R. Machado and S. Tekinay, “A Survey of Game-theoretic Approaches in Wireless Sensor Networks Computer Networks,” Computer Networks, Vol. 52, No. 16, pp. 3047-3061, 2008. [67]H. Hassoun, Fundamentals of Artificial Neural Networks, MIT Press, 1995. [68]G.Levitin and K. Hausken, “Resource Distribution in Multiple Attacks against a Single Target,” Risk Analysis, Vol. 30, No. 8, pp. 1231-1230, 2010. [69]T. Schelling, “The Reciprocal Fear of Surprise Attack,” RAND Corporation, Santa Monica, 1958.
|