Please use this identifier to cite or link to this item: https://hdl.handle.net/20.500.14279/14776
DC FieldValueLanguage
dc.contributor.authorPapadopoulou, Vicky-
dc.contributor.authorGregoriades, Andreas-
dc.date.accessioned2019-08-01T09:25:19Z-
dc.date.available2019-08-01T09:25:19Z-
dc.date.issued2009-
dc.identifier.citationOn the Move to Meaningful Internet Systems, 2009, 1 -6 November, Vilamoura, Portugalen_US
dc.identifier.isbn978-3-642-05290-3-
dc.identifier.urihttps://hdl.handle.net/20.500.14279/14776-
dc.description.abstractNon-functional requirements (NFR) such as network security recently gained widespread attention in distributed information systems. Despite their importance however, there is no systematic approach to validate these requirements given the complexity and uncertainty characterizing modern networks. Traditionally, network security requirements specification has been the results of a reactive process. This however, limited the immunity property of the distributed systems that depended on these networks. Security requirements specification need a proactive approach. Networks' infrastructure is constantly under attack by hackers and malicious software that aim to break into computers. To combat these threats, network designers need sophisticated security validation techniques that will guarantee the minimum level of security for their future networks. This paper presents a game-theoretic approach to security requirements validation. An introduction to game theory is presented along with an example that demonstrates the application of the approach.en_US
dc.formatpdfen_US
dc.language.isoenen_US
dc.rights© Springer-Verlag 2009.en_US
dc.subjectGame theoryen_US
dc.subjectNetwork securityen_US
dc.subjectNon-functional requirementsen_US
dc.subjectFuture networksen_US
dc.titleNetwork security validation using game theoryen_US
dc.typeConference Papersen_US
dc.collaborationEuropean University Cyprusen_US
dc.subject.categoryComputer and Information Sciencesen_US
dc.countryCyprusen_US
dc.subject.fieldSocial Sciencesen_US
dc.publicationPeer Revieweden_US
dc.relation.conferenceOn the Move to Meaningful Internet Systemsen_US
dc.identifier.doi10.1007/978-3-642-05290-3_37en_US
dc.identifier.scopus2-s2.0-78650721517-
dc.identifier.urlhttps://api.elsevier.com/content/abstract/scopus_id/78650721517-
cut.common.academicyear2009-2010en_US
item.fulltextNo Fulltext-
item.cerifentitytypePublications-
item.grantfulltextnone-
item.openairecristypehttp://purl.org/coar/resource_type/c_c94f-
item.openairetypeconferenceObject-
item.languageiso639-1en-
crisitem.author.deptDepartment of Management, Entrepreneurship and Digital Business-
crisitem.author.facultyFaculty of Tourism Management, Hospitality and Entrepreneurship-
crisitem.author.orcid0000-0002-7422-1514-
crisitem.author.parentorgFaculty of Tourism Management, Hospitality and Entrepreneurship-
Appears in Collections:Δημοσιεύσεις σε συνέδρια /Conference papers or poster or presentation
CORE Recommender
Show simple item record

SCOPUSTM   
Citations 50

1
checked on Mar 14, 2024

Page view(s)

275
Last Week
1
Last month
10
checked on May 13, 2024

Google ScholarTM

Check

Altmetric


Items in KTISIS are protected by copyright, with all rights reserved, unless otherwise indicated.