Author:
Shi Zheyuan Ryan,Procaccia Ariel D.,Chan Kevin S.,Venkatesan Sridhar,Ben-Asher Noam,Leslie Nandi O.,Kamhoua Charles,Fang Fei
Publisher
Springer International Publishing
Reference35 articles.
1. Abbasi, Y., et al.: Know your adversary: insights for a better adversarial behavioral model. In: CogSci (2016)
2. Albanese, M., Battista, E., Jajodia, S.: Deceiving attackers by creating a virtual attack surface. In: Jajodia, S., Subrahmanian, V.S.S., Swarup, V., Wang, C. (eds.) Cyber Deception, pp. 169–201. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-32699-3_8
3. Blum, A., Haghtalab, N., Procaccia, A.D.: Learning optimal commitment to overcome insecurity. In: NIPS (2014)
4. Chiang, C.Y.J., et al.: ACyDS: An adaptive cyber deception system. In: MILCOM (2016)
5. Fang, F., Stone, P., Tambe, M.: When security games go green: designing defender strategies to prevent poaching and illegal fishing. In: IJCAI (2015)
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献