完整後設資料紀錄
DC 欄位語言
dc.contributor.authorChen, Jan-Min Jr
dc.contributor.authorKuan, Fan-Yu Jr
dc.contributor.authorLin, Jin-Cherng Jr
dc.date.accessioned2011-01-10T00:06:27Z
dc.date.accessioned2020-05-18T03:10:49Z-
dc.date.available2011-01-10T00:06:27Z
dc.date.available2020-05-18T03:10:49Z-
dc.date.issued2011-01-10T00:06:27Z
dc.date.submitted2010-12-16
dc.identifier.urihttp://dspace.lib.fcu.edu.tw/handle/2377/29854-
dc.description.abstractThis article introduced a model which applies game theory and cost to assess the security level of a web application. A system administrator may assess security level and the cost of defending upon this model. Afterward, he may apply game theory to find the optimized defending strategy. In a limited resources situation, the result of this model may provide suggestions to allocate resources to different defending strategies.
dc.description.sponsorshipNational Cheng Kung University,Tainan
dc.format.extent6p.
dc.relation.ispartofseries2010 ICS會議
dc.subjectcomponent
dc.subjectGame Theory
dc.subjectNetwork Security
dc.subjectInformation Warfare
dc.subjectCost Assessment
dc.subject.otherInformation Security
dc.titleCost-Sensitive Defense Strategy Selection for Web Applications
分類:2010年 ICS 國際計算機會議(如需查看全文,請連結至IEEE Xplore網站)

文件中的檔案:
沒有與此文件相關的檔案。


在 DSpace 系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。