Defending against advanced persistent threats using game-theory S Rass, S König, S Schauer PloS one 12 (1), e0168675, 2017 | 124 | 2017 |
Uncertainty in games: Using probability-distributions as payoffs S Rass, S König, S Schauer Decision and Game Theory for Security: 6th International Conference, GameSec …, 2015 | 50 | 2015 |
Risk assessment uncertainties in cybersecurity investments A Fielder, S König, E Panaousis, S Schauer, S Rass Games 9 (2), 34, 2018 | 49 | 2018 |
Cyber-security in critical infrastructures S Rass, S Schauer, S König, Q Zhu Springer International Publishing, 2020 | 37 | 2020 |
Game theory for security and risk management S Rass, S Schauer Springer International Publishing. doi 10, 978-3, 2018 | 30 | 2018 |
Hybrid dependencies between cyber and physical systems S König, S Rass, B Rainer, S Schauer Intelligent Computing: Proceedings of the 2019 Computing Conference, Volume …, 2019 | 28 | 2019 |
On the cost of game playing: How to control the expenses in mixed strategies S Rass, S König, S Schauer Decision and Game Theory for Security: 8th International Conference, GameSec …, 2017 | 26 | 2017 |
Risk management S Rass, S Schauer, S König, Q Zhu Advanced Sciences and Technologies for Security Applications, 117-135, 2020 | 25* | 2020 |
Decisions with Uncertain Consequences—A Total Ordering on Loss-Distributions S Rass, S König, S Schauer PloS one 11 (12), e0168583, 2016 | 25 | 2016 |
Turning Quantum Cryptography against itself: How to avoid indirect eavesdropping in quantum networks by passive and active adversaries S Rass, S König Int. J. Adv. Syst. Meas 5 (1), 2012 | 22 | 2012 |
Password security as a game of entropies S Rass, S König Entropy 20 (5), 312, 2018 | 21 | 2018 |
Protecting water utility networks from advanced persistent threats: a case study A Gouglidis, S König, B Green, K Rossegger, D Hutchison Game Theory for Security and Risk Management: From Theory to Practice, 313-333, 2018 | 20 | 2018 |
R package’hyrim’: Multicriteria risk management using zero-sum games with vector-valued payoffs that are probability distributions (2017) S Rass, S König URL https://hyrim. net/software, 2017 | 20 | 2017 |
A stochastic framework for prediction of malware spreading in heterogeneous networks S König, S Schauer, S Rass Secure IT Systems: 21st Nordic Conference, NordSec 2016, Oulu, Finland …, 2016 | 19 | 2016 |
Risk propagation analysis and visualization using percolation theory S König, S Rass, S Schauer, A Beck Int. J. Adv. Comput. Sci. Appl.(IJACSA) 7 (1), 2016 | 18 | 2016 |
Assessing the impact of malware attacks in utility networks S König, A Gouglidis, B Green, A Solar Game Theory for Security and Risk Management: From Theory to Practice, 335-351, 2018 | 17 | 2018 |
Cut-the-rope: A game of stealthy intrusion S Rass, S König, E Panaousis International Conference on Decision and Game Theory for Security, 404-416, 2019 | 16 | 2019 |
Estimating cascading effects in cyber-physical critical infrastructures S Schauer, T Grafenauer, S König, M Warum, S Rass Critical Information Infrastructures Security: 14th International Conference …, 2020 | 15 | 2020 |
A simulation tool for cascading effects in interdependent critical infrastructures T Grafenauer, S König, S Rass, S Schauer Proceedings of the 13th International Conference on availability …, 2018 | 15 | 2018 |
An adaptive supply chain cyber risk management methodology S Schauer, M Stamer, C Bosse, M Pavlidis, H Mouratidis, S König, ... Digitalization in Supply Chain Management and Logistics: Smart and Digital …, 2017 | 15 | 2017 |