Chou-Chuan Chen

We don’t have enough information about this author to calculate their statistics. If you think this is an error let us know.
Learn More
The interactive behavior between the hacker and the defender is similar to information warfare. The process of attack and defend can be abstracted as a tree diagram and analyzed based on game theory. When a hacker launches an attack, he must do his best to get expected payoff. Similarly the defender may hope to protect system against attacker successfully(More)
  • 1