Folgen
Sandra König
Sandra König
Research Driven Solutions Limited (RDS)
Bestätigte E-Mail-Adresse bei ait.ac.at
Titel
Zitiert von
Zitiert von
Jahr
Defending against advanced persistent threats using game-theory
S Rass, S König, S Schauer
PloS one 12 (1), e0168675, 2017
1272017
Risk assessment uncertainties in cybersecurity investments
A Fielder, S König, E Panaousis, S Schauer, S Rass
Games 9 (2), 34, 2018
542018
Uncertainty in games: Using probability-distributions as payoffs
S Rass, S König, S Schauer
Decision and Game Theory for Security: 6th International Conference, GameSec …, 2015
522015
Cyber-security in critical infrastructures
S Rass, S Schauer, S König, Q Zhu
Springer International Publishing, 2020
442020
Game theory for security and risk management
S Rass, S Schauer
Springer International Publishing. doi 10, 978-3, 2018
342018
Hybrid dependencies between cyber and physical systems
S König, S Rass, B Rainer, S Schauer
Intelligent Computing: Proceedings of the 2019 Computing Conference, Volume …, 2019
292019
On the cost of game playing: How to control the expenses in mixed strategies
S Rass, S König, S Schauer
Decision and Game Theory for Security: 8th International Conference, GameSec …, 2017
262017
Risk management
S Rass, S Schauer, S König, Q Zhu
Advanced Sciences and Technologies for Security Applications, 117-135, 2020
25*2020
Decisions with Uncertain Consequences—A Total Ordering on Loss-Distributions
S Rass, S König, S Schauer
PloS one 11 (12), e0168583, 2016
252016
Turning Quantum Cryptography against itself: How to avoid indirect eavesdropping in quantum networks by passive and active adversaries
S Rass, S König
Int. J. Adv. Syst. Meas 5 (1), 2012
232012
Password security as a game of entropies
S Rass, S König
Entropy 20 (5), 312, 2018
222018
A stochastic framework for prediction of malware spreading in heterogeneous networks
S König, S Schauer, S Rass
Secure IT Systems: 21st Nordic Conference, NordSec 2016, Oulu, Finland …, 2016
212016
Protecting water utility networks from advanced persistent threats: a case study
A Gouglidis, S König, B Green, K Rossegger, D Hutchison
Game Theory for Security and Risk Management: From Theory to Practice, 313-333, 2018
202018
R package’hyrim’: Multicriteria risk management using zero-sum games with vector-valued payoffs that are probability distributions (2017)
S Rass, S König
URL https://hyrim. net/software, 2017
202017
A simulation tool for cascading effects in interdependent critical infrastructures
T Grafenauer, S König, S Rass, S Schauer
Proceedings of the 13th International Conference on availability …, 2018
182018
An adaptive supply chain cyber risk management methodology
S Schauer, M Stamer, C Bosse, M Pavlidis, H Mouratidis, S König, ...
Digitalization in Supply Chain Management and Logistics: Smart and Digital …, 2017
182017
Risk propagation analysis and visualization using percolation theory
S König, S Rass, S Schauer, A Beck
Int. J. Adv. Comput. Sci. Appl.(IJACSA) 7 (1), 2016
182016
Estimating cascading effects in cyber-physical critical infrastructures
S Schauer, T Grafenauer, S König, M Warum, S Rass
Critical Information Infrastructures Security: 14th International Conference …, 2020
172020
Cut-the-rope: A game of stealthy intrusion
S Rass, S König, E Panaousis
International Conference on Decision and Game Theory for Security, 404-416, 2019
172019
Assessing the impact of malware attacks in utility networks
S König, A Gouglidis, B Green, A Solar
Game Theory for Security and Risk Management: From Theory to Practice, 335-351, 2018
172018
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20