完整後設資料紀錄
DC 欄位 | 值 | 語言 |
---|---|---|
dc.contributor.author | Chen, Jan-Min Jr | |
dc.contributor.author | Kuan, Fan-Yu Jr | |
dc.contributor.author | Lin, Jin-Cherng Jr | |
dc.date.accessioned | 2011-01-10T00:06:27Z | |
dc.date.accessioned | 2020-05-18T03:10:49Z | - |
dc.date.available | 2011-01-10T00:06:27Z | |
dc.date.available | 2020-05-18T03:10:49Z | - |
dc.date.issued | 2011-01-10T00:06:27Z | |
dc.date.submitted | 2010-12-16 | |
dc.identifier.uri | http://dspace.lib.fcu.edu.tw/handle/2377/29854 | - |
dc.description.abstract | This article introduced a model which applies game theory and cost to assess the security level of a web application. A system administrator may assess security level and the cost of defending upon this model. Afterward, he may apply game theory to find the optimized defending strategy. In a limited resources situation, the result of this model may provide suggestions to allocate resources to different defending strategies. | |
dc.description.sponsorship | National Cheng Kung University,Tainan | |
dc.format.extent | 6p. | |
dc.relation.ispartofseries | 2010 ICS會議 | |
dc.subject | component | |
dc.subject | Game Theory | |
dc.subject | Network Security | |
dc.subject | Information Warfare | |
dc.subject | Cost Assessment | |
dc.subject.other | Information Security | |
dc.title | Cost-Sensitive Defense Strategy Selection for Web Applications | |
分類: | 2010年 ICS 國際計算機會議(如需查看全文,請連結至IEEE Xplore網站) |
文件中的檔案:
沒有與此文件相關的檔案。
在 DSpace 系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。