Modeling a network security environment as a game

作者: Mcclintock Jon Arron , Stathakopoulos George Nikolaos

DOI:

关键词:

摘要: Disclosed are various embodiments that model a network security environment as game. A data corresponding to is received. gaming generated based at least in part on the model. The represents decontextualized version of environment.

参考文章(15)
Michael Rash, Jamie Woodhead, Markus Nispel, Richard Graham, Device and related method for establishing network policy based on applications ,(2013)
Albert Wang, Daniel C. Green, Nipun Dave, Crowdsourced content publication platform ,(2013)
Abraham Arevalo, Robert C. Dixon, Alan G. Singletary, Creating a behavioral model of a hardware device for use in a simulation environment ,(2005)
Mark A. Malamud, Royce A. Levien, Edward K.Y. Jung, Robert W. Lord, Richard T. Lord, Methods and systems for managing services and device data ,(2012)
Thomas F. Fakes, Anders M. E. Samuelsson, Security policy update supporting at least one security service provider ,(2003)
Greg Megaw, Stephen V. Flowerday, Phishing within e-commerce: A trust and confidence game information security for south africa. pp. 1- 8 ,(2010) , 10.1109/ISSA.2010.5588333
Yang Wang, Yun Huang, Claudia Louis, Towards a Framework for Privacy-Aware Mobile Crowdsourcing international conference on social computing. pp. 454- 459 ,(2013) , 10.1109/SOCIALCOM.2013.71